"Transit like" secret backend plugin for PGP/GPG in Hashicorp Vault
It is now possible to upload the signatures made via the endpoint gpg/:name/sign
to a Rekor instance.
You can choose to upload information into the transparency when your create a new key, you only need to choose a value for the parameter transparency_log_address
(e.g. the public instance https://rekor.sigstore.dev/). For existing keys you can update the parameter transparency_log_address
with the new configuration update endpoint.
You can find more details about Rekor in the Rekor's documentation.
github.com/ProtonMail/go-crypto/openpgp
instead of the now deprecated golang.org/x/crypto/openpgp
/gpg/keys/:name
now prevents overwriting existing keys – thanks @trishankatdatadog (#51)Tested and built against HashiCorp Vault 1.0.0
show-session-key
to decrypt the session key of one message. This can be useful to decrypt large message without having to transmit the whole message to Vault.key_bits
parameter to create a key can now be given as a int as expectedkey_bits
usage