You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This user story is intended to develop class/classes to be commonly used by other classes that, having provided credentials, facilitate interacting with Hashicorp Vault Secret Manager in order to create CRUD operations over key/values stored. This class requires providing credentials and API Key to access Hashicorp Vault Secret Manager. In return the class provides CRUD operations over key/value pairs.
Definition of done
HcpVaultSecretManager class will take a configuration object including target region, the credentials to access the repository, etc, and in return provide CRUD operations over key/value pairs. The functionalities required to be implemented by the class are:
GetValueByKey: having passed the key fetches and returns its value if exists, otherwise throws an error
ImportKeyValue: having passed an array of key/value pairs will import them them into the storage if the key does not exist, otherwise throws an error
UpdateValue: having passed the key and new value will update its value by new one if the key exists otherwise throws an error
DeleteKeyValue: having passed the key the key/value pair will be removed from the storage if the key exists otherwise throws an error
Acceptance criteria
Having passed configurations the class provides an interface to Hashicorp Vault Secret Manager repository with CRUD operations over key/value pairs. Class functionalities mentioned in DoD must be tested successfully in both ideal and failure scenarios.
The text was updated successfully, but these errors were encountered:
#1644#1645#1646 can all be handled by vault itself, it shoudln't need to be setup externally as this is core functionality of vault itself
Hashicorp Vault is the default option for Key/Secret Management, though there are cases that one prefers to use Cloud solutions instead of using Vault. We intend to provide a comprehensive solution either cloud agnostic or cloud based one.
What I meant was that as Vault is used by default in Guardian it can be the nexus point to all of these secrets managers - think of it like a secrets proxy for whatever KMS / Secrets management system you want to use.
Then its just a configuration option rather than a full implementation of cloud specific code.
For example if you look at the various secrets engines here - there are around 23 that vault handles natively. That means a single API to work with 20+ secrets managers
Problem description
This user story is intended to develop class/classes to be commonly used by other classes that, having provided credentials, facilitate interacting with Hashicorp Vault Secret Manager in order to create CRUD operations over key/values stored. This class requires providing credentials and API Key to access Hashicorp Vault Secret Manager. In return the class provides CRUD operations over key/value pairs.
Definition of done
HcpVaultSecretManager class will take a configuration object including target region, the credentials to access the repository, etc, and in return provide CRUD operations over key/value pairs. The functionalities required to be implemented by the class are:
Acceptance criteria
Having passed configurations the class provides an interface to Hashicorp Vault Secret Manager repository with CRUD operations over key/value pairs. Class functionalities mentioned in DoD must be tested successfully in both ideal and failure scenarios.
The text was updated successfully, but these errors were encountered: