No Description
esell 728a304704
also broke dump, this fixes it
3 months ago
cmd also broke dump, this fixes it 3 months ago
util add local dump option 3 months ago
.gitignore first 3 months ago
Gopkg.lock wtf dep? removing kvpm as a dep (again) 3 months ago
Gopkg.toml wtf dep? removing kvpm as a dep (again) 3 months ago
README.md readme 3 months ago
main.go switch to cobra for CLI stuff 3 months ago

README.md

About

This is a toy password manager that uses Azure Key Vault as the backend to store your secrets/passwords. It supports the basic CRUD features.

kvpm also supports the ability to dump secrets to a local file where all values are encrypted. This would be used in situations where internet access was not available.

Install

go get github.com/esell/kvpm :)

Usage

You first need to set four environment variables before using the app:

AZURE_TENANT_ID: Your Azure tenant ID

AZURE_CLIENT_ID: Your Azure client ID. This will be an app ID from your AAD.

AZURE_CLIENT_SECRET: The secret for the client ID above.

KVAULT: The name of your vault (just the name, not the full URL/path)

List the secrets currently in the vault (not the values though):

kvpm

Get the value for a secret in the vault:

kvpm show YOUR_SECRETS_NAME

Get the value for a secret from local dump:

kvpm show -l YOUR_SECRETS_NAME

Add or Update a secret in the vault:

kvpm add YOUR_SECRETS_NAME YOUR_NEW_VALUE

Delete a secret in the vault:

kvpm delete YOUR_SECRETS_NAME

Dump secrets from Key Vault to local disk (encrypted)

kvpm dump

Hacking

If you want to hack on this, you’ll need to clone/fork the repo and then use dep to install the dependencies.