Vault Gpg Plugin Versions Save

"Transit like" secret backend plugin for PGP/GPG in Hashicorp Vault

v0.5.0

1 year ago

It is now possible to upload the signatures made via the endpoint gpg/:name/sign to a Rekor instance.

You can choose to upload information into the transparency when your create a new key, you only need to choose a value for the parameter transparency_log_address (e.g. the public instance https://rekor.sigstore.dev/). For existing keys you can update the parameter transparency_log_address with the new configuration update endpoint.

You can find more details about Rekor in the Rekor's documentation.

v0.4.0

1 year ago
  • Built with Go 1.17
  • Builds are deterministic
  • github.com/ProtonMail/go-crypto/openpgp instead of the now deprecated golang.org/x/crypto/openpgp

v0.3.0

2 years ago
  • The endpoint POST /gpg/keys/:name now prevents overwriting existing keys – thanks @trishankatdatadog (#51)
  • Split HTTP API into separate doc – thanks @trishankatdatadog (#50)

v0.2.4

3 years ago
  • Prebuilt binaries work with Alpine amd64 (#28)
  • Built with Go 1.14

v0.2.3

3 years ago
  • Tested and built against HashiCorp Vault 1.2.2
  • Built with Go 1.13

v0.2.2

4 years ago

Tested and built against HashiCorp Vault 1.0.0

v0.2.1

4 years ago
  • Tested and built against HashiCorp Vault 0.11.1
  • Built with Go 1.11

v0.2.0

5 years ago
  • New API endpoint show-session-key to decrypt the session key of one message. This can be useful to decrypt large message without having to transmit the whole message to Vault.

v0.1.4

5 years ago
  • Tested and built against HashiCorp Vault 0.9.4
  • Built with Go 1.10
  • [BUG_FIX] key_bits parameter to create a key can now be given as a int as expected

v0.1.3

5 years ago
  • Tested and built against HashiCorp Vault 0.9.3
  • Fix the inline documentation about key_bits usage
  • Add seal wrapping support (HashiCorp Vault Enterprise feature)