-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[FEATURE] Add new secrets manager implementation (Azure Key Vault) #6181
Comments
Links to: juspay/hyperswitch-card-vault#114 |
interested please assign @NishantJoshi00 |
Hey @gagandeepp Assigning this to you, thanks for your interest! |
As this issue has been un-assigned, can this be assigned to me please? |
Sure @TheVidz Assigning this to you. |
I'm sorry @gorakhnathy7 , I couldn't figure it out, you may assign the issue if someone else can.. |
Hi @NishantJoshi00 and @gorakhnathy7 , |
Implement Azure key vault support for secret management and encryption management in external_services. This can be used to securely storing sensitive configuration settings. Fixes juspay#6181
Hi @NishantJoshi00 and @gorakhnathy7, While implementing this feature, I encountered a version conflict with Issue Details
Since
Proposed SolutionUpdating
This updates the workspace Request for GuidanceWould updating the Thank you! |
Hey @Rafee-Mohamed, I think running this cargo update --precise 2.0.87 --package [email protected] Also, when pulling the Azure SDK crates, could you ensure that they're pulled from |
Hi @SanchithHegde, I’ve updated the dependencies from Git to cartes.io. While making this change, I wanted to confirm whether we should commit the Cargo.lock file as well. In general, for applications (as opposed to libraries), committing Cargo.lock ensures reproducible builds by locking dependency versions. However, I couldn’t find any specific guidance on whether this practice is being followed in this project. Could you please clarify the approach regarding this? Thanks! |
Yes, please commit the |
Hi @SanchithHegde , While raising a PR, I ran the predefined checks such as
I could not find specific instructions in the project guidelines on handling this scenario. I also attempted to exclude v2 while running the checks, but the issue persisted. Could you clarify the recommended approach for running predefined checks, such as testing and formatting, in cases where mutually exclusive features lead to conflicts? Any guidance would be greatly appreciated. Thanks! |
@Rafee-Mohamed Please install
|
📝 Feature Description
We need to expand our secrets manager support by integrating Azure Key Vault. Currently, our system supports three secrets manager interfaces: AWS KMS, Hashicorp Vault, and Plaintext. Adding Azure Key Vault will provide users with an additional option for securely storing sensitive configuration settings.
🔨 Possible Implementation
🔖 Note:
The implementation should maintain consistency with our existing secrets manager interfaces while accommodating any Azure Key Vault-specific features or requirements. Ensure that the integration is scalable and performant, considering potential high-load scenarios.
Submission Process:
Refer here for Terms and conditions for the contest.
The text was updated successfully, but these errors were encountered: