
Security News
Open Source Maintainers Demand Ability to Block Copilot-Generated Issues and PRs
Open source maintainers are urging GitHub to let them block Copilot from submitting AI-generated issues and pull requests to their repositories.
github.com/DoodleScheduling/vault-backend-migrator
vault-backend-migrator
is a tool to export and import (migrate) data across vault clusters.
Right now this tool really only supports the secret
/kv
backend (version 1 in particular, although version 2 works too). Other mount points might work, but many create dynamic secrets behind the scenes or don't support all operations (i.e. LIST).
You'll want to go get -f -u github.com/adamdecaf/vault-backend-migrator
this project. It will pull down the vault source code to your GOPATH too.
There's also a docker image: docker pull adamdecaf/vault-backend-migrator
After pulling the code it's helpful to set a few environment variables. (These may not all be required for your setup.) These variables will be for the vault you're exporting from.
export VAULT_ADDR=http://127.0.0.1:8200/
export VAULT_CAPATH=<full filepath to .crt bundle>
export VAULT_TOKEN=<vault token>
Note: You'll need to make sure the VAULT_TOKEN has permissions to list and read all vault paths.
Then you should be able to run an export command:
$ ./vault-backend-migrator -export secret/ -file secrets.json
If you are using the version 2 of the backend and want all the data in there:
$ ./vault-backend-migrator -export secret/data/ -metadata secret/metadata/ -file secrets.json -ver 2
This will create a file called secrets.json
that has all the keys and paths. (Note: This is literally all the secrets from the generic backend. Don't share this file with anyone! The secret data is encoded in base64, but there's no protection over this file.)
Once you've created an export you are able to reconfigure the vault environment variables (VAULT_ADDR
and VAULT_TOKEN
usually) to run an import command (remember to specify -ver 2
in the command line when importing to a version 2 backend).
$ ./vault-backend-migrator -import secret/ -file secrets.json
This will output each key the tool is writing to. After that a simple vault list
command off the vault cli will show the secrets there.
Note: It's recommended that you now delete secrets.json
if you don't need it. If you can install a tool like srm
to really delete this file.
brew install srm
apt-get install secure-delete
This tool reads all the VAULT_*
environment variables as the vault cli does. You likely need to specify those for the address, CA certs, etc.
This project uses Go Modules and thus requires Go 1.11+.
There are various makefile commands for building parts of the release make release
builds and pushes everything.
You can run make docker
to build a tagged docker image.
FAQs
Unknown package
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Open source maintainers are urging GitHub to let them block Copilot from submitting AI-generated issues and pull requests to their repositories.
Research
Security News
Malicious Koishi plugin silently exfiltrates messages with hex strings to a hardcoded QQ account, exposing secrets in chatbots across platforms.
Research
Security News
Malicious PyPI checkers validate stolen emails against TikTok and Instagram APIs, enabling targeted account attacks and dark web credential sales.