* Fixed bug where default vaultaddr is never used. * Fixing vault tests on Windows. Co-authored-by: Phil Kedy <phil.kedy@gmail.com>  | 
			||
|---|---|---|
| .. | ||
| aws | ||
| azure/keyvault | ||
| gcp/secretmanager | ||
| hashicorp/vault | ||
| kubernetes | ||
| local | ||
| Readme.md | ||
| metadata.go | ||
| requests.go | ||
| responses.go | ||
| secret_store.go | ||
		
			
				
				Readme.md
			
		
		
			
			
		
	
	Secret Stores
Secret Stores provide a common way to interact with different secret stores, cloud/edge/commercial or open-source.
Currently supported secret stores are:
- Kubernetes
 - Hashicorp Vault
 - Azure KeyVault
 - AWS Secret manager
 - GCP Cloud KMS
 - GCP Secret Manager
 
Implementing a new Secret Store
A compliant secret store needs to implement the following interface:
type SecretStore interface {
  // Init authenticates with the actual secret store and performs other init operation
  Init(metadata Metadata) error
  // GetSecret retrieves a secret using a key and returns a map of decrypted string/string values
  GetSecret(req GetSecretRequest) (GetSecretResponse, error)
  // BulkGetSecrets retrieves all secrets in the store and returns a map of decrypted string/string values
  BulkGetSecret(req BulkGetSecretRequest) (BulkGetSecretResponse, error)
}