vault
Here are 1,296 public repositories matching this topic...
Both parseInt and parseFloat take strings as arguments and convert them to 64 bit numbers of their appropriate type. The json.Number type is a string sub-type that contains integers or floats, but it causes a type error with the 2 parse functions. They should be change to accept json.Number fields and handle them appropriately.
-
Updated
May 28, 2022 - JavaScript
On lines
https://github.com/rochacbruno/dynaconf/blob/master/dynaconf/validator.py#L202-L205
validators.validate is calling from_env and it makes the variables to be reloaded from source files.
This is not good for testing.
Solution:
- Check if validation is happening on the same current env, then don't reload
- accept argument
reload=Falsethat will cause those lines to pass
-
Updated
May 26, 2022 - Go
-
Updated
May 29, 2022 - Java
-
Updated
Jun 1, 2022 - Go
Is your feature request related to a problem? Please describe.
Vault has backends for AWS like dynamo and s3. However to use them you should provide credentials. AWS support 2 solutions to eliminate this. IAM roles for Service Accounts and Instance profile roles.
Due to some unknown reason vault requires more time to start when using dynamic creds than explicit definition keys in s3 block o
So there is currently an hvac.v1.Client.sys.list_mounted_secrets_engines() method.
However, for obvious reasons this will fail as it will attempt to list all mounted secrets engines (as it calls /v1/sys/mounts).
The web UI, however, shows what mounts the current token has access to.
While poking around the live API documentation the other day (`VAULT_BASE_URI/ui/vault/api-explorer
New Provider Request
Manage secrets from Mac keychain
Details
- URL: https://support.apple.com/en-il/guide/mac-help/mchlf375f392/mac
- Modes: read+write
- GitHub projects: https://github.com/keybase/go-keychain
-
Updated
Mar 11, 2020 - Go
-
Updated
May 30, 2022 - Java
-
Updated
May 24, 2022 - Shell
-
Updated
Mar 10, 2017 - Perl
-
Updated
Jun 1, 2022 - Go
-
Updated
Apr 25, 2022 - Go
-
Updated
Aug 14, 2021 - HCL
-
Updated
Apr 24, 2022 - JavaScript
-
Updated
May 18, 2022 - Go
In an effort to gather the list of users of argocd-vault-plugin, we are asking that if you are a user of AVP, please add your organization to our users list! https://github.com/IBM/argocd-vault-plugin/blob/main/USERS.md.
This helps us understand where and how AVP is being used so we can continuously improve the project.
Thank you!
-
Updated
Oct 17, 2021
-
Updated
Apr 1, 2022 - HTML
Improve this page
Add a description, image, and links to the vault topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the vault topic, visit your repo's landing page and select "manage topics."


overview
Today, the
RequestRecorderrecords service RPC calls. If those take less than< 0ms, the recorder marks them as0ms.proposal
Make the
RequestRecorderreport theelapsedtime for service calls that take less than< 0msas decimal values, instead of 0.notes
testing
If you take this on, I'd kindly advise to start in a TDD fashion. Write a test