micado/security-policy-manager
workflow director for security enablers within the MiCADO framework
3.8K
v2.0:
This module provides APIs to manage sensitive information, including application sensitive information and infrastructure sensitive information.
curl -H "Content-Type: application/json" -d '{"name":"secret1","value":"123"}' -X POST spm:5003/v1.0/secrets
curl -H "Content-Type: application/json" -d '{"value":"456"}' -X PUT spm:5003/v1.0/secrets/secret1
curl -X GET spm:5003/v1.0/secrets/secret1
curl -X DELETE spm:5003/v1.0/secrets/secret1
curl -H "Content-Type: application/json" -d '{"name":"secret1","value":"123"}' -X POST spm:5003/v1.0/appsecrets
curl -X GET spm:5003/v1.0/appsecrets/secret1
curl -X DELETE spm:5003/v1.0/appsecrets/secret1
Assuming that you installed Robot framework successfully (Please follow this link if you has not installed the Robot framework yet: https://github.com/robotframework/QuickStartGuide/blob/master/QuickStart.rst#demo-application)
Download the vault server from https://www.vaultproject.io/downloads.html
Create a config file named vault.hcl with the below content:
storage "file" {
path = "datafile"
}
listener "tcp" {
address = "127.0.0.1:8200"
tls_disable = 1
}
(all secrets will be written in the file 'datafile' which resides in the same directory with the executable file 'vault')
./vault server -config=vault.hcl
VAULT_URL = "http://127.0.0.1:8200"
gunicorn -b 0.0.0.0:5003 app:app
robot test/test_script.rst
docker pull micado/security-policy-manager