- Add Ability to set JWT audience claim (#f3306c0)
BREAKING CHANGE: JWTs can now be created with a fix audience value. Needed for OpenZiti integration
- Enabling hooks for Vault identity features (#171) (#53c30ee)
- Refactor all usages of path to be SecretName in APIs and InsecureSecrets configuration (#9c30f8a)
BREAKING CHANGE: Path renamed SecretName, GetSecrets renamed to GetSecret, StoreSecrets renamed to StoreSecret, GetKeys renamed to GetSecretNames
- Update module to v3 (#52131f2)
BREAKING CHANGE: Import paths will need to change to v3
- Add Consul access and role interface (#163) (#7e745c8)
- Add GetKey API (#161) (#46e806f)
- Add error handling for status 404 (#160) (#c185b68)
- Upgrade to Go 1.18 (#995c520)
- security: implement runtime token provider GetRawToken client API call for obtaining secret store token (#141) (#7ea7921)
- security: Add go build tags for non-delayed start builds (#144) (#8f104b7)
- security: Enable gosec and default linter set (#05e2b9d)
- security: Add GenerateConsulToken API to SecretClient interface (#6432e0d)
- security: Add Generate Registry Token API for secretstore client (#5e2f4d4)
- Reduce the resource constraints as too many semaphores costs now (#1b8a009)
- security: Fix JSON structure of token self response (#d9d1b45)
- Tweaked GenerateConsulToken to use service's own token (#fe93ff0)
- Change unseal to just take KeysBase64 (#f998050)
- Refactor to be proper abstraction of a SecretStore (#89b3b67)
BREAKING CHANGE: All existing SecretStore configuration must add `Type = 'vault'`
- Resolve compiler errors in unit test when using latest go-mod-core-contracts (#7271790)
- Implement better abstraction for use in Secret Provider (#62837fd)
- Remove trailing slash from vault URL to avoid 400 error (#1487bb7)