Skip to content

Releases: IBM/secrets-manager-go-sdk

v2.0.8

07 Oct 04:22
Compare
Choose a tag to compare

2.0.8 (2024-10-07)

  • Support for intermediate CA certificates rotation

v2.0.7

23 Sep 03:58
Compare
Choose a tag to compare

2.0.7 (2024-09-23)

Support for IAM service authorization

v2.0.6

09 Sep 05:38
Compare
Choose a tag to compare

2.0.6 (2024-09-09)

Add the expiration_date field to secret versions' response.

v2.0.5

05 Aug 08:56
Compare
Choose a tag to compare

2.0.5 (2024-08-05)

You can use the Private Certificate engine to generate Root and Intermediate CA certificates with private keys managed by a Hardware Security Module (HSM). This feature is currently available using IBM Cloud HPCS HSM.

v2.0.4

11 Mar 07:50
Compare
Choose a tag to compare

2.0.4 (2024-03-11)

  • Add List filters: secret_types, match_all_labels
  • Add Expiration date field to iam_credentials and service_credentials API responses

v2.0.3

07 Feb 07:12
Compare
Choose a tag to compare

2.0.3 (2024-02-07)

This release adds support fora random password generator policy, allowing you to control the length and complexity of the auto-generated password (numbers, symbols, upper-case).

v2.0.2

11 Dec 08:18
Compare
Choose a tag to compare

2.0.2 (2023-12-11)

This release provides support for a new secret type - Service credentials. Learn more in the service documentation and API Docs.

v2.0.1

19 Sep 09:11
Compare
Choose a tag to compare

2.0.1 (2023-09-19)

This release provides support for retrieving the secret value by using its secret Name. Learn more in the service documentation and API Docs.

v2.0.0

17 Apr 18:33
Compare
Choose a tag to compare

A new version of the Secrets Manager SDKs is now available. The following updates are included in this release.

  • You no longer need to include secret_type in the API URL to identify a secret.
  • The secret group name must be unique per Secrets Manager instance.
  • Resources updates are defined as HTTP patch operations.
  • The configurations API follows the pattern of the Secrets Manager API. config_type acts as the API discriminator, similarly to secret_type.
  • Configurations are modeled as openAPI composites with metadata and data parts, similarly to the Secrets Manager model. Mappings between IAM roles and configurations API follow the same pattern for the Secrets Manager API. For example, an IAM viewer can list configurations to view their metadata.
  • List operations return metadata only for secret, secret version, and config resources.
  • The action to rotate a secret is now the create a new secret version API: POST/v2/secrets/{id}/versions.
  • The action to restore secret version is now the create a new secret version API with the restored_from_version body parameter.
  • The action to delete IAM credentials is now the delete a secret version data API: DELETE /v2/secrets/{id}/versions/{version_id}/secret_data.
  • Policies API is now embedded into the metadata API in version 2.0.
  • The actions to list Secrets and get secret metadata return the versions_total field. The version's content is not included.
  • Current and previous secret versions can be referenced by using the current and previous aliases in version APIs.
  • The secret lock mode names exclusive and exclusive_delete are replaced by remove_previous and remove_previous_and delete. The modes still perform the same action, only the names changed.
    For more information, check out the API docs.

v1.0.50

13 Apr 20:30
Compare
Choose a tag to compare

1.0.50 (2023-04-13)