C&I Projects
Latest
Daily Triage
Weekly Triage
In Milestone
Quarterly Scrub
Receive queue
Important
Similar
64 PRs
470 issues
779.5d avg wait
Showing 0 of 534 unique items, Avg age: 1825.1d , Historical closure rate:
0.3 issue(s) per day
Items
Milestone:
Archive (0001-01-01)
R&D Boost (0001-01-01)
Archive (0001-01-01)
candidate (0001-01-01)
R&D Boost (0001-01-01)
R&D Boost (0001-01-01)
R&D Boost (0001-01-01)
All items
All open PR's and Issues that should be considered for repository stats (hidden)
534 unique items
Completion ETA:
~2029-08-16
Assi
Open PRs
Open Issues
conjur#1161
(CA) Challenge conjur-map format and parsing
π
conjur#1088
Convert Command class call methods to explicit mode
π
conjur#920
Add error injection to Command class in oidc
π
secretless-broker#354
Istio can be used with an external DB
π
secretless-broker#325
Secretless can be deployed with a sidecar injector
π
secretless-broker#82
AWS handler has test suite with documentation
π
secretless-broker#1340
WIP: mongodb connector
π
conjur-openapi-spec#214
Allow deployment of stable Conjur version
π
sidecar-injector#75
POC to add security context values
π
conjur#2046
Should raise informative log error in case role not exist in k8s inject_client_cert
π
conjur#1673
Migrate conjur-policy-parser locally
π
conjur-api-java#22
Allow reading the auth token provided by Kubernetes/OpenShift sidecar
π
conjur#1530
Separate orchestrator config from policy_version model
π
conjur#1213
No indication for the user when providing a wrong Conjur data key
π
conjur#1096
A central location exists for Conjur Log docs
π
conjur-api-ruby#148
Ruby client library tests are run against the EE
π
conjur-api-java#35
Add API use-case ex in Docker to docs
π
secrets-provider-for-k8s#251
Release automation - Push Helm Chart to helm-charts repo
π
secrets-provider-for-k8s#138
Enhancement: Remove use of downward API from manifest
π
nobody
conjur#2541
Remove `rack-rewrite` gem as it appears it is no longer needed
conjur#2893
Add read-only configuration
conjur#2699
Fix broken tests by refershing materalized views
conjur#2522
Auth persist api
conjur#2436
Auth api additions
conjur#2712
POC: Batch retrieval with POST and JSON body
conjur#2853
cyberark/migrate-slosilo-gem
conjur#2836
Solution Design: CyberArk Conjur Provider for Secret Store CSI Driver
conjur#2829
Replace Conjur Auth Token with a valid JWT token
conjur#2807
WIP: Add reset password rake task
conjur#2734
Authn-JWT Refactor
conjur#2714
Policy Template Factory
conjur#2666
WIP: Policy lifecycle extensions
conjur#2439
Semantic Logging (with metrics)
conjur#2543
Potential Policy workflow for Synchronizer leader election
conjur#2616
Allow OIDC Providers to be available via local socket
conjur#2631
add logging if send message fails
conjur#2634
Adds authenticator support for passing OIDC token via body or authorization header
conjur#2640
Prevent status webservices from being returned on the providers endpoint
conjur#2696
Developer documentation
conjur#2863
WIP: Early Policy factory POC
conjur#2896
PoC for managing write-only permission at the Sequel level
conjur#2944
Log warning of dropped updates to existing resources in policy POST
conjur#2946
Use context variable instead of instance variable for certs
conjur#2953
Add OIDC proxy integration tests
conjur#2990
Authn jwt refactor v5
conjur#2999
Authenticator refactor v2
conjur#2565
Add annotation based user search
secretless-broker#1443
SSH connector improvements
secretless-broker#953
improved ssh service connector
secretless-broker#1223
POC: Auto generation of troubleshooting guide
secretless-broker#1379
WIP: Robust testing of AWS using feature-rich mock server
conjur-oss-helm-chart#184
Make Postgres FIPS compliant
conjur-openapi-spec#218
Added new PersistAuth endpoint to spec
conjur-openapi-spec#220
Added new routes for OIDC functionality
conjur-api-python#51
Added dry-run parameter on policy methods
conjur-sdk-java#71
Add GitHub Action to auto-refresh Java client
conjur-authn-k8s-client#521
Fix Postgres FIPS issue in tests
conjur-authn-k8s-client#527
Add telemetry toggles
secrets-provider-for-k8s#552
leverage file temaplates with k8s-secret targets
secrets-provider-for-k8s#551
improve error handling batch retrieve
secrets-provider-for-k8s#550
retrieve k8s secrets based on label
secrets-provider-for-k8s#553
Run in standalone mode
kubernetes-conjur-demo#153
Scan for and remove internal URLs
cloudfoundry-conjur-demo#76
Use groups instead of layers
ansible-conjur-collection#206
Sanity test fixes
ansible-conjur-collection#205
Fix the Sanity Test for Ansible 2.16 version
ansible-conjur-collection#185
ONYX-26897 To reuse the token
ansible-conjur-collection#186
Onyx 26897 retry
ansible-conjur-collection#178
Implement support for JWT authentication
terraform-provider-conjur#121
ReadMe Update and pointing to new version of conjur API go
terraform-provider-conjur#126
Readme updated and unit test, acceptance testing, conjur-api-go version update
terraform-provider-conjur#133
Update Conjur secret value
conjur-opentelemetry-tracer#10
Add Tracer creation functions
conjur#2841
Extracting `restricted_to` into a reference to an array of strings
conjur#2494
Dev environment supports hot reloading
conjur#2430
Policy Permit Privileges without brackets doesn't produce an error
conjur#2380
Better handling of malformed Kubernetes service account token for Kubernetes authenticator
conjur#2245
Add minimum thread count to puma configuration
conjur#2181
Kubernetes Authenticator Websocket Client doesn't support Server Name Indication (SNI)
conjur#2133
Fix ApplicationController complexity
conjur#2117
Fix all Conjur CC issues
conjur#2108
Update release workflow to include API version
conjur#2081
Add tests for no STDIN but `--password-from-stdin` option is provided
conjur#2067
Non-empty policy variable values should apply and take precedence for Kubernetes authenticator
conjur#2062
A test setup exists for testing simplified authn client config
conjur#2000
Validation for restricted to setting while loading a policy
conjur#1980
Update .dockerignore to include deb file exclusions
conjur#1964
Update upgrade process: separate schema and data restoration
conjur#1959
There is a draft plan for improving Conjur sidecar automation in Kubernetes / OpenShift
conjur#1958
Adding recursive permit statements
conjur#1956
Support debugging authn-k8s in dev env
conjur#1945
Nil error in authn_k8s/inject_client_cert.rb
conjur#1922
Variable Content Validation
conjur#1920
Hosts can acquire valid password via password change
conjur#1863
Support validating host annotations for authentication while loading a policy
conjur#1765
Cucumber - Remove audit keyword from log step
conjur#1757
Authentication token available in OAuth format
conjur#1753
Conjur policy reload does not update annotations in APPEND mode
conjur#1718
Configure SSL certs/keys and postgres ssl_mode
conjur#1700
CIDR Restriction - invalid cidr value DB Error
conjur#1696
Consider refactoring request IP tests to smaller units under test
conjur#1679
CIDR Support Proxy - Remove validate_origin from Authenticate
conjur#1651
Conjur Account change to Space
conjur#1618
Load empty policy cause to 403 in creating host from token
conjur#1611
Implicit database dependency in credentials command classes
conjur#1604
Update landing page jquery to 3.3.1-dfsg or higher
conjur#1603
Update landing page bootstrap to 3.4.1 or later
conjur#1602
Tags and successful image publishes trigger builds of downstream projects
conjur#1587
Refactor `./start`
conjur#1559
authn_k8s:inject_client_cert: Make client cert path configurable
conjur#1557
Extend rake task to get next available trackable log message code
conjur#1524
Querying resources as a role without specifying the fully qualified ID leads to a 403 response
conjur#1519
Adds info endpoint for server/follower ID and version for debugging
conjur#1503
Update audit private enterprise number
conjur#1502
Update private enterprise number contact
conjur#1488
CI pipeline never exercises "environments/production.rb"
conjur#1478
Conjur CI workflow is documented
conjur#1467
Improve security by permitting only expected params
conjur#1466
fetchCertificate and pdf/fetchCertificate consist of hard coded path to httpclient
conjur#1370
Cyberark DAP Host Policy docs are updated to include the `api_key_enabled` attribute
conjur#1369
Cyberark DAP User Policy docs are updated to include the `api_key_enabled` attribute
conjur#1368
Cyberark Conjur Host Policy docs are updated to include the `api_key_enabled` attribute
conjur#1367
Cyberark Conjur User Policy docs are updated to include the `api_key_enabled` attribute
conjur#1366
Changing a User/Host api_key_enabled attribute to true generates an API key
conjur#1365
Changing a User/Host api_key_enabled attribute to false removes the API key
conjur#1364
Logging into the default authenticator with a User/Host with disabled API keys fails
conjur#1363
Rotating a User/Host with disabled API key results in an error
conjur#1362
An API key is not generated when api_key_enabled attribute is true
conjur#1361
An API key is generated when api_key_enabled attribute is true
conjur#1327
Conjur README is clear and approachable
conjur#1265
Kubernetes authenticator supports container-level application identity
conjur#1258
Add GKE testing section to README
conjur#1191
Architecture Diagram for DB off OpenShift
conjur#1163
Switch UTs from Convey to testify in k8s authn client
conjur#1154
Tests a 504 response code in OIDC
conjur#1142
Conjur authn-k8s client user inputs can be provided as CMD args along as env vars
conjur#1132
Audit batch retrieve secret should be performed on full success only
conjur#1115
Logs in `production` env should include severity, timestamp & pid
conjur#1112
Executing docker run on Conjur image produces useful error
conjur#1101
Decide on permissions to webservice
conjur#1097
Authenticators API
conjur#1093
We understand the testing currently performed in the cyberark/conjur repo
conjur#1092
Value objects should not interact with the DB
conjur#1089
Convert FetchOidcSecrets to OidcVariable
conjur#1053
`/authenticators/available` API returns the authenticators which are available for configuration - DRAFT
conjur#1051
`/authenticators` API returns authenticators that are ready for authentication
conjur#984
No indication of missing rotator
conjur#930
Can't load a delegation policy for a variable contains colon (:) in name
conjur#898
cucumber steps can be shared between profiles
conjur#844
Policy reloading when an integration that auto-loads policy is used has passed XA
conjur#843
Secrets can be retrieved with variable prefix
conjur#840
Kubernetes authenticator has a service account token option
conjur#835
Replace Ruby Sass
conjur#824
Authenticate controller logs error message correctly
conjur#813
Host Factory created hosts don't have the policy namespace of their layer
conjur#812
Conjur k8s tests can be run on minikube
conjur#806
LDAP Authenticator behavior is verified for users loaded to policy locations other than root
conjur#793
authn-k8s can't authenticate pods controlled by DeploymentConfig
conjur#780
LDAP Authenticator supports mutual TLS
conjur#746
Authenticator "origin" parameter should be more clearly named
conjur#735
ci/test script referenes cucumber/cucumber.yml
conjur#734
Sequel log level is set to :warn
conjur#690
Possible Future CA Development
conjur#688
Conjur CA Services are documented
conjur#678
authenticator prints useful error on 400 response
conjur#677
docs mention SPIFFE
conjur#675
OpenShift events are displayed in the UI's audit log
conjur#670
Conjur is tested under continuous loads
conjur#649
Conjur can rotate Oracle database connections
conjur#648
SSH public key rotation exists in Conjur
conjur#647
SSH key pair rotation is available in Conjur
conjur#646
S3 based Host Factory Token rotation has been ported
conjur#645
GCP Service Account rotator has been ported
conjur#644
Rotators have been migrated from V4
conjur#640
Conjur Docker image follows the standard version naming convention
conjur#621
Host CIDR restriction can be set using host factory token
conjur#620
CIDR Authentication Restriction for Users and Hosts is Documented
conjur#614
Cucumber tests should run in random order
conjur#607
A user sees the Audit events are visible to them
conjur#599
Use of !include causes better error message
conjur#582
Can't permit on a nested list of resources using policy
conjur#540
Deprecate the route GET /resources/:account
conjur#527
Multi-Domain LDAP Authentication
conjur#513
64bit OS required for Docker on Linux, but Docker doesn't validate architecture and will pass `hello-world` successfully on 32bit
conjur#509
Error msg unclear when loading policy with multiple unnamed hostfactory configurations
conjur#482
Document maximum policy size
conjur#426
Site assets are minified in production build
conjur#181
String ids considered harmful
secretless-broker#1417
Running juxtaposer on release is automated
secretless-broker#1403
provide ability to intercept sigquit (kill -3) to generate current execution stack snapshots for all active tasks
secretless-broker#1372
Error codes for improved troubleshooting
secretless-broker#1371
aws connector should have integration tests
secretless-broker#1348
Release MacOS DMG file with compressed SecretlessBroker.app
secretless-broker#1347
Secretless component quality levels move from alpha/beta/GA to community/trusted/certified
secretless-broker#1342
Migrate to a new method for running the Secretless health check
secretless-broker#1337
Support multi-value dynamic credentials
secretless-broker#1336
There should be capabilities in `secretless.yml` to supply custom settings to providers
secretless-broker#1324
Generic HTTP Connector: OAuth1 supports different signature hashing methods
secretless-broker#1312
Create a Docker CLI Connector for Secretless
secretless-broker#1283
There is an example generic HTTP connector config for Salesforce
secretless-broker#1279
There is an example generic HTTP connector config for the Kubernetes API
secretless-broker#1262
There is an example generic HTTP connector config for the Google Cloud SDK
secretless-broker#1252
Reconcile MSSQL and (MySQL+PG) integration testing strategies
secretless-broker#1251
better UX for test infrastructure
secretless-broker#1241
There exists a Cassandra TCP Connector with username and password based authentication
secretless-broker#1229
A mechanism exists to redact sensitive values in logs
secretless-broker#1225
There is a central set of tests that validate the SSL configuration of the TLS connectors
secretless-broker#1222
Secretless has a Cassandra DB connector
secretless-broker#1213
Secretless has a DB2 connector
secretless-broker#1205
TLS Connectors share a structure for connection details
secretless-broker#1201
Determine how Secretless responds to DB server TLS renegotiation
secretless-broker#1182
Secretless configuration files support ssl configuration information
secretless-broker#1179
Service Connector for MarkLogic
secretless-broker#1178
Secretless optionally supports encryption for the client-to-Secretless connection
secretless-broker#1171
Add Unix socket flow to Kubernetes tutorial
secretless-broker#1152
Proxyservice package is unit tested
secretless-broker#1132
JDBC Jar is built at runtime for integration tests
secretless-broker#1112
MSSQL connector reports "unsupported version" when backend can't be contacted
secretless-broker#1097
Database clients receive a meaningful error when a new connection request has bad credentials
secretless-broker#1094
Secretless has configurable connection timeouts for connectors
secretless-broker#1083
Example plugin uses Secretless logger
secretless-broker#1065
Broker can delegate basic sanity checks on `credentials` keys to plugins
secretless-broker#1063
Broker does early verification of plugin parameters
secretless-broker#1042
Conjur provider has improved automated tests
secretless-broker#1036
Unit tests validate service connector plugin error handling
secretless-broker#1021
Add a Security Model to the connector plugin README
secretless-broker#1011
ForceSSL defaults to true
secretless-broker#994
Use our logger implementation for signal/reload listener
secretless-broker#993
Use our logger implementation for health check output
secretless-broker#992
Reintroduce back some logging messages we lost in refactoring
secretless-broker#980
Secretless transmits packets after authentication without transforming them
secretless-broker#979
Add `--allow-builtin-plugin-overrides` CLI argument
secretless-broker#971
secretless plugin test harness exists
secretless-broker#957
Re-evaluate ConnectionManager API
secretless-broker#941
Remove URL parsing logic from `internal/proxyservice/proxy_service.go`
secretless-broker#940
Add better logic when we can't open a tcp socket
secretless-broker#937
Replace XXXFunc with values in AvailablePlugins UTs
secretless-broker#934
Tests are added for external_plugins.go
secretless-broker#902
secretless.Logger is simplified with cleaner tests
secretless-broker#875
Logger tests use mocks for simplicity
secretless-broker#836
Improve support for configuration CRDs
secretless-broker#834
Secretless supports plugin types besides connectors
secretless-broker#822
Make our plugin system work on windows
secretless-broker#774
Remove Secretless website from project and put in its own repository
secretless-broker#715
CRDs are updated to use v2 configuration format
secretless-broker#704
fs_watcher has a goroutine leak
secretless-broker#701
Best practices recommendations exist for writing new DB handlers
secretless-broker#692
generalise SSL cert mounting instructions for postgres
secretless-broker#690
design document exists for supported and future handlers
secretless-broker#686
evaluate http.Client timeout in secretless-broker and conjur provider
secretless-broker#681
Tutorial progress bar position is fixed
secretless-broker#680
Abstraction exists in tutorial to accept multiple tutorials as parameter
secretless-broker#671
A good way to prevent log leaks has been agreed upon
secretless-broker#657
K8s tutorial scripts use correct method for waiting on containers
secretless-broker#645
Jekyll can create foldable content from markdown
secretless-broker#640
Cleanup and document code for autogenerating test secretless.yml
secretless-broker#629
A method exists for encoding HandshakeV10 as bytes
secretless-broker#625
SSL util functions for handlers have correct interface and clean code
secretless-broker#624
Use structured representation of options for Pg Handler
secretless-broker#623
MySQL Handler has good code quality and all required tests
secretless-broker#620
Comment mysql handler unit tests to increase readability
secretless-broker#619
a test matrix exists with a variety of clients for any given handler
secretless-broker#618
Use structured representation of options for MySQL Handler
secretless-broker#617
Credentials are consistently zeroized after use
secretless-broker#608
Improve dev flow on tests, test documentation, and test infrastructure
secretless-broker#607
MySQL/PG/SSL tests have been refactored
secretless-broker#592
Simplify ConfigureBackend in database handlers
secretless-broker#591
Add README to the integration tests
secretless-broker#585
An explicit test exists for TLS between secretless and backend
secretless-broker#559
Build scripts and docker caching have been evaluated
secretless-broker#558
Investigate the impact of TLS between Secretless and backend server
secretless-broker#556
Evaluate support for multiple mysql auth plugins
secretless-broker#546
Stories should have acceptance criteria for security
secretless-broker#514
Providers retrieve secret values per connection in batches if possible
secretless-broker#510
AWS Secrets credential provider has integration tests
secretless-broker#507
Secretless has AWS Secrets Provider
secretless-broker#506
Config watcher is tested
secretless-broker#505
Secretless watches for config file changes
secretless-broker#498
Unit tests should not require mercurial
secretless-broker#493
Conjur authentication logic is removed from the provider
secretless-broker#483
PostgreSQL handler protocol has unit tests
secretless-broker#477
Secretless quick start demo instructions are clear about flow
secretless-broker#473
Secretless optionally retries connections
secretless-broker#467
HTTP response times are measured
secretless-broker#466
SSH throughput is measured
secretless-broker#465
MySQL query response times are measured
secretless-broker#451
Secretless has an Azure Key Vault credential provider
secretless-broker#449
Microsoft Love - Support for Microsoft/Azure tools
secretless-broker#409
Website has performance page
secretless-broker#404
a test suite exists for the generic sidecar injector
secretless-broker#403
sidecar injector allows mounting a volume with statically compiled summon
secretless-broker#400
Broker documentation is improved
secretless-broker#383
Broker is secure
secretless-broker#381
Broker has additional configuration options
secretless-broker#379
Performance metrics are published
secretless-broker#374
A pass-through listener exists
secretless-broker#342
sidecar-injector should allow sharing of secretless domain sockets via volume mounts
secretless-broker#270
SSH agent only keeps loaded keys for the duration of connection
secretless-broker#265
Secretless has option to configure response when provider fails to resolve a variable
secretless-broker#264
Secretless optionally supports secrets caching
secretless-broker#260
Add MongoDB handler/listener
secretless-broker#220
README should reflect GKE setup established initially in k8s demo dir
secretless-broker#31
Use a dot foo.bar scheme to access nested data from HashiCorp Vault
secretless-broker#17
define and create new Summon format (post secretsyml)
secretless-broker#16
use viper for standardised configuration (12 factor)
helm-charts#16
Helm charts are published to Helm artifact hub and helm/hub
helm-charts#12
Helm charts repo is updated after new helm chart release
conjur-oss-helm-chart#177
Conjur does not start with an external Postgres database due to OpenSSL internal error, assertion failed: Low level API call to digest SHA256 forbidden in FIPS mode
conjur-oss-helm-chart#167
Add nodeSelector to list of Chart Parameters
conjur-oss-helm-chart#145
Static sub-resource names
conjur-oss-helm-chart#142
Add check/warning for pre-existing ClusterRole in Kubernetes example scripts
conjur-oss-helm-chart#141
Clarify compatible database versions in README
conjur-oss-helm-chart#139
Make conjur proxy container optional and configurable
conjur-oss-helm-chart#136
Add option to auto-create a Conjur data encryption key
conjur-oss-helm-chart#135
Add deprecation warnings to NOTES.txt
conjur-oss-helm-chart#134
Deprecated features to consider for removal for next major release (3.0.0)
conjur-oss-helm-chart#133
Instructions fail when LoadBalancer service defines a hostname instead of an IP for the LB ingress
conjur-oss-helm-chart#132
Add authn-k8s demo app E2E test based on KinD GitHub actions
conjur-oss-helm-chart#131
Eliminate redundant Kubernetes service for Conjur
conjur-oss-helm-chart#130
Failure in Conjur schema migrations of external DB can't recover
conjur-oss-helm-chart#104
Reorganize README.md KinD example to make it more of a Getting Started guide
conjur-oss-helm-chart#86
Document use of or add subchart for bitnami/postgresql
conjur-oss-helm-chart#68
Helm deployment instructions (README) include architecture diagrams
conjur-oss-helm-chart#61
Helm pipeline runs `helm package` on tags and auto-adds the artifact to a GitHub release
conjur-oss-helm-chart#57
Pipeline validates upgrade instructions
conjur-oss-helm-chart#54
Automated end-to-end testing suite
conjur-oss-helm-chart#46
Adds TLS between Conjur and posgres pod
conjur-oss-helm-chart#28
Documentation is updated to clarify setup steps
conjur-oss-helm-chart#27
The Helm chart supports custom value for the PostgreSQL container UID
conjur-oss-helm-chart#9
CI pipeline runs kubesec
conjur-oss-helm-chart#7
Conjur Helm chart has published shasums
conjur-openapi-spec#219
Kong Examples no longer run
conjur-openapi-spec#213
Allow scripts to deploy Conjur either as latest or edge versions
conjur-openapi-spec#207
Update k8's inject cert test to run against latest Conjur Image
conjur-openapi-spec#197
Fix flaky API contract tests
conjur-openapi-spec#150
Implement Route Checking for Conjur
conjur-openapi-spec#107
Move to using either latest or stable image for OpenAPI generator
conjur-openapi-spec#28
Automatically generate Sphinx documentation for python client code
conjur-api-ruby#186
Migrate client configuration from `conjur-cli` gem to this gem
conjur-api-ruby#162
Ruby API gem correctly handles Users/Hosts with `api_key_enabled`
conjur-api-ruby#145
Allow using multiple independent API connections
conjur-api-ruby#134
add support for CONJUR_AUTHN_TOKEN_FILE
conjur-api-ruby#128
Token expiration should be aware of the "exp" field in new style tokens
conjur-api-go#60
GoLang SDK correctly handles Users/Hosts with `api_key_enabled`
conjur-api-java#124
JAX-RS implementation JavaEE (javax) vs JakartaEE (jakarta)
conjur-api-java#103
java.lang.RuntimeException: java.lang.ClassNotFoundException: Class 'org.glassfish.jersey.client.JerseyClientBuilder' was not found
conjur-api-java#102
Add ability to pass in CONJUR_APPLIANCE_URL and CONJUR_ACCOUNT into Conjur class
conjur-api-java#99
Unit tests exist for each class
conjur-api-java#65
Code climate issues have been resolved
conjur-api-java#55
Add unit tests
conjur-api-java#54
Java SDK correctly handles Users/Hosts with `api_key_enabled`
conjur-api-java#42
Add code coverage to conjur-api-java
conjur-api-java#33
Is javadoc published anywhere on the web?
conjur-api-java#25
Support for watching authentication token file
conjur-api-java#16
NullPointerException when using single Conjur instance to retrieve multiple secrets
conjur-api-java#13
Load Conjur identity & conf from files(/etc/, ~/.conjurrc) in addition to environment variables
conjur-api-java#5
Generate a JAR file for consumption
conjur-api-dotnet#56
Add integration tests
conjur-api-dotnet#49
Add Batch Secret Retrieval
conjur-api-dotnet#47
Retrieving Environment Variables for Authentication
conjur-api-dotnet#38
.NET SDK correctly handles Users/Hosts with `api_key_enabled`
conjur-api-dotnet#24
Library is compatible with both .Net Core and Framework
summon#251
Default not supported for `gopass`
summon#238
Add templating support for ephemeral cred/config files
summon#199
Make list of environment variable names available in child process
summon#153
Multiple `-e` environments can be supported
summon#152
Clean up empty tempdirs
summon#151
Add more information about `!file` handling
summon#149
Summon has examples of unofficial "provider wrappers" somewhere (e.g. `gopass`)
summon#135
Zeroize all vars right after start of child process
summon#104
fix: substitution variable format interferes with provider key resolution
summon#93
Docs: `common` section and root vars injection rules should be better documented
summon-conjur#83
Better error message when appliance_url doesn't match machine address in .netrc or conjur.identity
summon-conjur#33
Docs is updated to address conjurized requirement
summon-keyring#29
The Keyring provider does not work on Windows
summon-keyring#17
Ensure documentation is accurate
summon-keyring#7
Add CI pipeline
summon-keyring#5
Convert ring.py to Python 3
summon-aws-secrets#48
Tests exist for `main.go`
summon-aws-secrets#44
Ability to specify versions of secrets to retrieve
summon-aws-secrets#17
Option to base64 encode secrets values
summon-s3#22
Apple silicon is not supported for this provider
conjur-authn-k8s-client#529
CAKC017 error does not remove "client.pem" causing continual failures
conjur-authn-k8s-client#329
K8s Authenticator Quickstart: Make KinD optional
conjur-authn-k8s-client#327
Document client errors
conjur-authn-k8s-client#320
E2E Workflow Scripts: Remove platform specific script branches
conjur-authn-k8s-client#317
E2E Workflow Scripts: Workflow should detect which flavor of Conjur has been deployed to the cluster
conjur-authn-k8s-client#316
E2E Workflow Scripts: Conditionally validate sample applications' authentication with their backends
conjur-authn-k8s-client#315
E2E Workflow Scripts: Conditionally deploy MySQL sample application backend
conjur-authn-k8s-client#310
Kubernetes test automation and demo materials are revised
conjur-authn-k8s-client#305
Add get-conjur-cert.sh and test-helm scripts to release artifacts
conjur-authn-k8s-client#302
E2E Workflow Scripts: Test app injects Summon into shared volume
conjur-authn-k8s-client#291
The Namespace prep helm test uses validator Host ID to validate the Kubernetes authenticator is functional
conjur-authn-k8s-client#290
The Namespace helm test queries the /info endpoint for validation
conjur-authn-k8s-client#289
There is an initial framework for the Namespace prep Helm test
conjur-authn-k8s-client#228
There is a helm test for the cluster prep helm chart
conjur-authn-k8s-client#222
Enable cloud provided authentication methods in sidecar
conjur-authn-k8s-client#188
Add UTs for response util methods
conjur-authn-k8s-client#172
Enable use of system CA store for Conjur's SSL certificate verification
conjur-authn-k8s-client#169
Add Info log with configuration
conjur-authn-k8s-client#162
Enhance env var utils to accept min and max values
conjur-authn-k8s-client#159
Extract backoff loop from main.go into a util
conjur-authn-k8s-client#116
Challenge the way integration tests run on authn-client
conjur-authn-k8s-client#54
Consider setting automation to work with latests scripts/DAP/Conjur
conjur-authn-k8s-client#25
unit test suites exists
conjur-authn-k8s-client#9
Authenticator gets pod name / namespace using Kubernetes API
conjur-authn-k8s-client#7
Authenticator has configurable logging levels
secrets-provider-for-k8s#530
retryCountLimit not evaluated in helm deployment
secrets-provider-for-k8s#289
Add optional hostAliases to values.yaml
secrets-provider-for-k8s#270
Tests automate fetching version from values.yml instead of hardcoding it
secrets-provider-for-k8s#239
Add GH action for dispatching release event
secrets-provider-for-k8s#106
Add tests to verify our logs
sidecar-injector#93
TLS handshake error when following README in local cluster
sidecar-injector#56
Sidecar containers images configurable at runtime
sidecar-injector#41
A "What is this section" exists in the README
sidecar-injector#38
Update cross compilation goreleaser image to public
sidecar-injector#31
Upgrade instructions exist
sidecar-injector#24
Add troubleshooting section for missing annotations
sidecar-injector#8
Plz be consistent w/ access token file name
kubernetes-conjur-deploy#171
Close ports for the conjur follower
kubernetes-conjur-deploy#168
Need to run retry mechanism for delete namespace command
kubernetes-conjur-deploy#162
Openshift password should be given/pulled from summon
kubernetes-conjur-deploy#161
Auto Enrollment Secrets Add should be part of the script
kubernetes-conjur-deploy#160
Image pull backoff in OC4.5 because image url is external when using start.sh
kubernetes-conjur-deploy#119
Migrate secrets provider repo to use the helm chart for deploying conjur in automation
kubernetes-conjur-deploy#117
Unbound variable error on stop
kubernetes-conjur-deploy#116
Repo needs a CHANGELOG
kubernetes-conjur-deploy#99
Don't use separate yamls for OC and K8s where possible
kubernetes-conjur-deploy#74
Deployment Flow with Seed Fetcher is tested in CI
kubernetes-conjur-deploy#62
Deploy Scripts don't work on current Minishift Version
kubernetes-conjur-deploy#61
Deploy can be performed w/ non-cluster admin user
kubernetes-conjur-deploy#60
Standby and follower seeding encrypts key files
kubernetes-conjur-deploy#55
Tests include coverage of master deployment to both GKE and OpenShift
kubernetes-conjur-deploy#48
Followers are configured to be distributed across nodes
kubernetes-conjur-deploy#31
the check dep script is checking for OSHIFT_CONJUR_ADMIN_USERNAME but the scripts are using OPSHIFT_CLUSTER_ADMIN_USERNAME
kubernetes-conjur-deploy#25
update deploy / demo scripts for v5 OSS
kubernetes-conjur-deploy#21
configure nodePort for haproxy to provide external access to Conjur Master service
kubernetes-conjur-deploy#20
add script to delete deployments
kubernetes-conjur-deploy#19
developer user needs access to internal registry
kubernetes-conjur-deploy#18
data key should be stored as a secret
kubernetes-conjur-demo#135
Add validator host ID to allow authn-k8s config to be validated
kubernetes-conjur-demo#130
Automated tests only run against annotation-based identities
kubernetes-conjur-demo#115
Add DeploymentConfigs as app identity in Jenkins OpenShift CI
kubernetes-conjur-demo#113
Replace use of sed for yaml templating with Yaml.sh or helm charts
kubernetes-conjur-demo#66
--dry-run option
kubernetes-conjur-demo#52
CI takes too long
kubernetes-conjur-demo#38
Automated tests validate demos against Conjur OSS
kubernetes-conjur-demo#32
Scripts check conditions rather than sleeping
kubernetes-conjur-demo#29
sidecar injector is incorporated into kubernetes-conjur-demo
kubernetes-conjur-demo#11
conjur-authenticator rolebinding requires elevated privileges to create
kubernetes-conjur-demo#10
test app is deployed using helm chart
cloudfoundry-conjur-buildpack#91
Users can determine buildpack version from Cloud Foundry
cloudfoundry-conjur-buildpack#82
The secrets.yml check in the supply script uses different logic than the `conjur-env` binary to find the secrets.yml
cloudfoundry-conjur-buildpack#80
Secrets.yml configuration can be supplied as an environment variable
cloudfoundry-conjur-buildpack#60
conjur-env binary uses batch secret retrieval
cloudfoundry-conjur-buildpack#52
Add code coverage for cloudfoundry-conjur-buildpack
cloudfoundry-conjur-buildpack#21
Docs includes instructions for decorator buildpack
cloudfoundry-conjur-demo#52
Add CI pipeline
cloudfoundry-conjur-demo#48
Update the demo app ruby version
cloudfoundry-conjur-demo#47
Remove unnecessary dependencies from demo app
cloudfoundry-conjur-demo#36
Demo has a CI pipeline for the local flow
cloudfoundry-conjur-demo#35
Demo has a CI pipeline for the tile
cloudfoundry-conjur-demo#22
Demo should run w/o internet access after it is built
cloudfoundry-conjur-demo#11
change to ./stop instead of ./bin/stop
ansible-conjur-collection#207
Conjur lookup plugin fails to verify TLS certificate - works ok in role and Conjur Go CLI
ansible-conjur-collection#191
Unable to run cyberark.conjur.conjur_host_identity role.
ansible-conjur-collection#187
Consider using true/false for all booleans in docs
ansible-conjur-collection#146
Support JWT Authentication for Ansible
ansible-conjur-collection#145
Support JWT Authentication for Ansible
ansible-conjur-collection#74
Bring ansible-conjur-collection to Certified level
ansible-conjur-collection#73
Troubleshoot Ansible Conjur installation on 2.9
ansible-conjur-collection#72
Troubleshoot Ansible Conjur installation on 2.9
ansible-conjur-collection#56
Collection is published to Automation Hub
ansible-conjur-collection#49
Add other ways to specify Conjur / DAP identity in `cyberark.conjur.conjur_variable`
ansible-conjur-collection#47
The UX of configuring the lookup plugin and role has been evaluated
ansible-conjur-collection#46
Roles are tested with Molecule
ansible-conjur-collection#45
The log output of the conjur-role without "no_log" set to true has been reviewed
ansible-conjur-collection#44
Roles and plugins share a build stage and test directory structure
ansible-conjur-collection#43
Documentation is clear that input variable path should not be urlencoded
ansible-conjur-collection#42
Expand Ansible Collection to include Conjur Role
ansible-conjur-host-identity#30
Migrate this Ansible role to the Conjur Ansible collection
ansible-conjur-host-identity#26
conjur_variable lookup plugin can be improved
ansible-conjur-host-identity#22
Add code coverage to ansible-conjur-host-identity
ansible-conjur-host-identity#5
CA cert content is dumped to stdout
ansible-conjur-host-identity#4
The parameter `conjur_ssl_certificate` requires cert as a string, not a file.
ansible-conjur-host-identity#3
Parameter `conjur_validate_certs should be `True` by default
ansible-conjur-host-identity#2
Deprecation warning when role is run
conjur-puppet#258
Error with self signed certificate
conjur-puppet#201
Investigate (and possibly implement) ability to check if we can validate that agent credentials are valid
conjur-puppet#65
Use OpenAPI spec to generate the client code
conjur-puppet#29
WinCred resource and provider are separated to their own Puppet Module
terraform-provider-conjur#134
Documentation Bug in README in Build From Source section
terraform-provider-conjur#132
Add an ability to update Conjur secret
terraform-provider-conjur#99
Provider is not up to date and does not support CONJUR_AUTHN_TOKEN that is included in conjur-api-go
terraform-provider-conjur#94
Manifest example in provider's documentation is wrong.
terraform-provider-conjur#60
Add unit tests
terraform-provider-conjur#53
Add Windows instructions to README
ansible-conjur-collection#202
Retry in conjur_variable lookup not working for errors out of urllib_error.HTTPError or socket.timeout
π
kubernetes-conjur-demo#89
Repo's use of bash-lib means you can't run the scripts individually
π
conjur#1801
User warning for annotations that equal attribute names in policy
π
conjur#1562
Baseline functionality for "Testing Best Practices" has been established
π
conjur#918
CommandClass can receive errors directly
π
secretless-broker#475
Make localhost socket use info more prominent
π
conjur#1269
Test log output for application identity in GKE
π
conjur#3014
Automated PR to update settings
π
conjur-oss-helm-chart#186
Add resource values for nginx and postgres
π
conjur-oss-helm-chart#183
Add option from datakey to be provided from existing secret
π
conjur-api-dotnet#92
Cleanup and add async methods
π
conjur-api-dotnet#85
WIP: Publsh to nuget.org
π
conjur-api-dotnet#17
API wrapper library is available through NuGet
π
secrets-provider-for-k8s#549
Secrets rotation improvements
π
ansible-conjur-collection#210
Validate compatibility with ansible-core 2.19
π
conjur#2551
Conjur tracing with jaeger
π
conjur#1787
Conjur debian package is updated to exclude irrelevant files and directories
π
conjur#1198
Audit atomicity
π
conjur#1177
(GA) Test if encryptions of k8s secrets is working
π
conjur#1159
(CA) Add log level configuration
π
conjur#1082
Investigate permission problems in master startup
π
conjur#1077
Map persistence locations in appliance image
π
conjur#1075
Replace deployment config with stateful set
π
conjur#1070
Play with master inside minishift
π
conjur#1066
OAuth 2 Device Grant - Spike
π
conjur#650
A K8s/OpenShift version support matrix is available
π
secretless-broker#772
secretless can validate config files from CLI
π
secretless-broker#771
Reduce MySQL handler noise
π
secretless-broker#721
Rename `TempFactory` to `TempFileFactory`
π
secretless-broker#380
Broker is easy to develop for
π
secretless-broker#249
Secrets do not remain in the sidecar memory
π
conjur-puppet#235
Investigate if `puppetlabs-registry` dependency is still needed
π
secretless-broker#1335
Support Vault AppRole auth method in provider
π
ansible-conjur-collection#37
There is a demo showing how to use this collection
π
conjur#2587
Update k8s test app base image
π
conjur#943
Conjur Certificate Authorities support signing intermediate certificate authorities
π
conjur#923
Conjur Certificate Authorities support signing SSH RSA public keys in PEM format
π
Triage Party v1.4.0