hsm
Here are 116 public repositories matching this topic...
-
Updated
Jun 22, 2022 - C++
Instead of having 3 parameters to handle HSM vs non-HSM, signed vs unsigned and testnet vs mainnet, we should we have a single parameter (which picks among 4 profiles).
The 4 profiles would be:
dev-without-hsm= no HSM, btc-testnetdev-with-hsm= HSM, unsigned, btc-testnetstaging= HSM, signed, btc-testnetprod= HSM, signed, btc-mainnet
-
Updated
May 30, 2022 - Java
-
Updated
Mar 22, 2021 - C
-
Updated
Jun 19, 2022 - Java
-
Updated
Aug 12, 2019 - C#
This issue was migrated from Pagure Issue #3199. Originally filed by rcritten (@rcritten) on 2020-08-03 15:59:52:
- Assigned to nobody
IPA can be installed in a CA-less configuration with the user providing the certificates required for operation. Running ipa-healthcheck with this will generate quite a few pk
-
Updated
Jul 2, 2022 - Python
-
Updated
Oct 11, 2021 - C++
-
Updated
Feb 29, 2020
-
Updated
Jun 29, 2022 - C
-
Updated
Jul 4, 2022 - Java
-
Updated
Jun 7, 2022 - Kotlin
-
Updated
Apr 7, 2019 - Python
-
Updated
Jun 9, 2022 - C++
-
Updated
Nov 3, 2020 - Python
-
Updated
Jun 20, 2022 - C
-
Updated
Apr 28, 2022 - C++
-
Updated
Jul 5, 2022 - Go
-
Updated
Apr 28, 2022 - Go
-
Updated
Jul 9, 2019 - Python
-
Updated
Sep 21, 2021 - C++
Improve this page
Add a description, image, and links to the hsm topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the hsm topic, visit your repo's landing page and select "manage topics."
Is your feature request related to a problem? Please describe.
Vault has backends for AWS like dynamo and s3. However to use them you should provide credentials. AWS support 2 solutions to eliminate this. IAM roles for Service Accounts and Instance profile roles.
Due to some unknown reason vault requires more time to start when using dynamic creds than explicit definition keys in s3 block o