You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/_pages/0280-roadmap.md
+45-42Lines changed: 45 additions & 42 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,32 +34,11 @@ this page, and also [the changelog](/docs/changelog/) to reflect the changes.
34
34
35
35
## Active Iterations
36
36
37
-
### VSecM v0.24.0 (*codename: Draco*)
38
-
39
-
**Feb 29, 2023 - Mar 27, 2023**
40
-
41
-
To automate things and be able to dynamically follow issues better, from
42
-
this point on we'll label them and share the GitHub filter here, instead
43
-
of outlining them one by one.
44
-
45
-
This iteration will be focused on demos and documentation.
46
-
47
-
[Here is a list of issues that are candidate for VSecM vDraco](https://github.com/vmware-tanzu/secrets-manager/issues?q=is%3Aissue+label%3Av0.24.0-candidate+).
48
-
49
-
### VSecM v0.25.0 (*codename: Eridanus*)
50
-
51
-
**Mar 28, 2023 - Apr 24, 2024**
52
-
53
-
This iteration, our focus will be on testing, test automation, and test coverage.
54
-
55
-
[Here is a list of issues that are candidate for VSecM
This iteration is about improving **VSecM Sentinel** to ingest different kinds
82
-
of secrets, including very long secrets from a stdin pipe. This will be a
83
-
feature-focused iteration.
61
+
This iteration is again about increasing coverage. We will focus on
62
+
unit tests.
84
63
85
64
[Here is a list of issues that are candidate for VSecM vHydra](https://github.com/vmware-tanzu/secrets-manager/issues?q=+label%3Av0.28.0-candidate+).
86
65
87
66
### VSecM v0.29.0 (*codename: Indus*)
88
67
89
68
**Jul 18, 2024 - Aug 14, 2024**
90
69
91
-
This is a bug-bash iteration where we'll leave no bug left behind.
70
+
In this iteration, we will focus on adding use cases and tutorials, along with
71
+
any stability and security improvement that may come our way.
92
72
93
73
[Here is a list of issues that are candidate for VSecM vIndus](https://github.com/vmware-tanzu/secrets-manager/issues?q=+label%3Av0.29.0-candidate+).
94
74
95
75
### VSecM v0.30.0 (*codename: Lupus*)
96
76
97
77
**Aug 15, 2024 - Sep 11, 2024**
98
78
99
-
This iteration is about enabling external access to **VSecM Safe** in a secure
100
-
manner. We will also focus on secure logging and preventing log tampering.
79
+
This iteration will be about adding more features that may be immediately
80
+
useful around **VSecM Sentinel** CLI.
101
81
102
82
[Here is a list of issues that are candidate for VSecM vLupus](https://github.com/vmware-tanzu/secrets-manager/issues?q=+label%3Av0.30.0-candidate+).
103
83
104
84
### VSecM v0.31.0 (*codename: Mensa*)
105
85
106
86
**Sep 12, 2024 - Oct 09, 2024**
107
87
108
-
This iteration is about visibility and metrics. We'll create a `/stats` and a
109
-
`/health` endpoint for **VSecM Safe** among other observability improvements.
88
+
This iteration is about SDKs and KMS integration.
110
89
111
90
[Here is a list of issues that are candidate for VSecM vMensa](https://github.com/vmware-tanzu/secrets-manager/issues?q=+label%3Av0.31.0-candidate+).
112
91
113
92
### VSecM v0.32.0 (*codename: Norma*)
114
93
115
94
**Oct 10, 2024 - Nov 06, 2024**
116
95
117
-
In this iteration we'll do a full-blown self-security assessment and publish
118
-
our findings. These findings will be used later for a third-party security
119
-
audit.
96
+
This iteration is about visibility and metrics. We'll create a `/stats` and a
97
+
`/health` endpoint for **VSecM Safe** among other observability improvements.
120
98
121
99
[Here is a list of issues that are candidate for VSecM vNorma](https://github.com/vmware-tanzu/secrets-manager/issues?q=+label%3Av0.32.0-candidate+).
122
100
123
-
* Google Cloud KMS Integration
124
-
125
101
### VSecM v0.33.0 (*codename: Orion*)
126
102
127
103
**Nov 07, 2024 - Dec 04, 2024**
128
104
129
-
In this iteration, we will focus on non-Kubernetes **VSecM** deployments.
105
+
This iteration we’ll focus on helm charts and code coverage.
130
106
131
107
[Here is a list of issues that are candidate for VSecM vOrion](https://github.com/vmware-tanzu/secrets-manager/issues?q=+label%3Av0.33.0-candidate+).
132
108
133
109
### VSecM v0.34.0 (*codename: Perseus*)
134
110
135
111
**Dec 05, 2024 - Jan 01, 2025**
136
112
137
-
This iteration is about UI/UX fixed on the website, and CSS cleanup.
113
+
We will continue with the helm charts work that we have started in the
114
+
previous iteration.
138
115
139
116
[Here is a list of issues that are candidate for VSecM vPerseus](https://github.com/vmware-tanzu/secrets-manager/issues?q=+label%3Av0.34.0-candidate+).
140
117
141
118
### VSecM v0.35.0 (*codename: Reticulum*)
142
119
143
120
**Jan 02, 2025 - Jan 29, 2025**
144
121
145
-
We'll focus on creating Kubernetes Operators around **VSecM** to better
146
-
coordinate certain workflows.
122
+
We'll focus on more advanced use cases, such as OIDC authentication and
123
+
storing the root keys in an external KMS.
147
124
148
125
[Here is a list of issues that are candidate for VSecM vReticulum](https://github.com/vmware-tanzu/secrets-manager/issues?q=+label%3Av0.35.0-candidate+).
149
126
150
127
### VSecM v0.36.0 (*codename: Sagittarius*)
151
128
152
129
**Jan 30, 2025 - Feb 26, 2025**
153
130
154
-
This iteration is focused on better state management.
131
+
This iteration, we’ll continue with KMS integration and OIDC authentication.
155
132
156
133
[Here is a list of issues that are candidate for VSecM vSagittarius](https://github.com/vmware-tanzu/secrets-manager/issues?q=+label%3Av0.36.0-candidate+).
157
134
158
135
### VSecM v0.37.0 (*codename: Telescopium*)
159
136
160
137
**Feb 27, 2025 -- Mar 26 2025**
161
138
139
+
The main focus of this iteration is integrating with upstream cloud providers
140
+
such as AWS, Azure and GCP.
141
+
142
+
[Here is a list of issues that are candidate for VSecM vTelescopium](https://github.com/vmware-tanzu/secrets-manager/issues?q=+label%3Av0.37.0-candidate+).
143
+
144
+
### VSecM v0.38.0 (*codename: Ursa*)
145
+
162
146
This is a "*catch all*" that contains all remaining documented future plans.
163
147
We will create new iterations from it as the time gets closer.
164
148
165
-
[Here is a list of issues that are candidate for VSecM vTelescopium](https://github.com/vmware-tanzu/secrets-manager/issues?q=+label%3Av0.37.0-candidate+).
149
+
[Here is a list of issues that are candidate for VSecM vUrsa](https://github.com/vmware-tanzu/secrets-manager/issues?q=+label%3Av0.38.0-candidate+).
166
150
167
151
## Closed Iterations
168
152
153
+
### VSecM v0.25.0 (*codename: Eridanus*)
154
+
155
+
**Mar 28, 2023 - Apr 24, 2024**
156
+
157
+
This iteration was mostly about security and stability.
158
+
159
+
[Here is a list of issues that were closed in vEridanus](https://github.com/vmware-tanzu/secrets-manager/issues?q=+label%3Av0.25.0-candidate+).
160
+
161
+
### VSecM v0.24.0 (*codename: Draco*)
162
+
163
+
**Feb 29, 2023 - Mar 27, 2023**
164
+
165
+
To automate things and be able to dynamically follow issues better, from
166
+
this point on we started labeling them and share the GitHub filter here.
167
+
168
+
This iteration was mainly focused on demos and documentation.
169
+
170
+
[Here is a list of issues that were closed in vDraco](https://github.com/vmware-tanzu/secrets-manager/issues?q=is%3Aissue+label%3Av0.24.0-candidate+).
0 commit comments