Glint Vault for Secure Configuration Management#2
Draft
johnnyfreeman wants to merge 1 commit intomainfrom
Draft
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR introduces a comprehensive Vault system to Glint, enabling users to securely manage sensitive configuration files (e.g., environment files, secrets) through encryption and decryption workflows. The Vault functionality is designed to support compliance efforts, prevent accidental data exposure, and simplify workflows for managing secure data.
New Commands
glint vault createglint vault create --output secrets.toml.encryptedglint vault encrypt <file>--delete: Deletes the original unencrypted file after encryption (with confirmation).--output <file>: Specify the name of the encrypted file.glint vault encrypt config.toml --deleteglint vault decrypt <file>--output <file>: Specify the name of the decrypted file.--temp: Decrypts to a temporary file for immediate use (auto-deletes after).glint vault decrypt secrets.toml.encrypted --tempglint vault edit <file>--editor <editor>: Specify a custom editor (e.g., vim, nano).--backup: Creates a backup of the original encrypted file before editing.glint vault edit secrets.toml.encrypted --editor vimglint vault rotate <file>glint vault rotate secrets.toml.encryptedglint vault listglint vault list --path /configsglint vault view <file>glint vault view secrets.toml.encryptedFeatures
Encryption/Decryption:
- Uses AES-256 encryption for robust security.
- Decrypts files entirely in memory to prevent accidental exposure.
Editor Integration:
- Supports external editors via EDITOR or VISUAL environment variables.
- Defaults to nano if no editor is specified.
Compliance-Friendly:
- No temporary files are written to disk (except when explicitly requested).
- Secure workflows for managing sensitive data.
Flexible Options:
- Optional
--deleteand--backupflags for streamlined file management.- Customizable output file locations and names.
Example Workflows
Encrypt a Configuration File:
Edit an Encrypted File:
Rotate the Password for a File:
List All Encrypted Files:
Securely View a File's Content:
Future Enhancements
This new Vault functionality enhances Glint’s capabilities, offering users a secure, user-friendly way to manage sensitive data while adhering to best practices for compliance and security.