https://github.com/vmware/secrets-manager
VMware Secrets Manager is a lightweight secrets manager to protect your sensitive data. It’s perfect for edge deployments where energy and footprint requirements are strict—See more: https://vsecm.com/
https://github.com/vmware/secrets-manager
cloud-native edge kubernetes secret-management secrets-manager security spiffe spire zero-trust
Last synced: 1 day ago
JSON representation
VMware Secrets Manager is a lightweight secrets manager to protect your sensitive data. It’s perfect for edge deployments where energy and footprint requirements are strict—See more: https://vsecm.com/
- Host: GitHub
- URL: https://github.com/vmware/secrets-manager
- Owner: vmware
- License: bsd-2-clause
- Created: 2023-07-19T14:37:24.000Z (about 2 years ago)
- Default Branch: main
- Last Pushed: 2025-09-09T01:10:27.000Z (28 days ago)
- Last Synced: 2025-09-09T03:48:09.288Z (27 days ago)
- Topics: cloud-native, edge, kubernetes, secret-management, secrets-manager, security, spiffe, spire, zero-trust
- Language: Go
- Homepage: https://vsecm.com/
- Size: 34.9 MB
- Stars: 175
- Watchers: 9
- Forks: 30
- Open Issues: 93
-
Metadata Files:
- Readme: README.md
- Contributing: CONTRIBUTING.md
- License: LICENSE
- Code of conduct: CODE_OF_CONDUCT.md
- Codeowners: CODEOWNERS
- Security: SECURITY.md
- Notice: NOTICE
- Maintainers: MAINTAINERS.md
Awesome Lists containing this project
README
## **VMware Secrets Manager** *for cloud-native apps*

## ⚠️ Important: v2.0.0 Work in Progress
A major architectural redesign is underway in the
[`feature/v2.0.0-preview`](https://github.com/vmware/secrets-manager/tree/feature/v2.0.0-preview)
branch. **This `v2.0.0-preview` branch is currently non-functional
and under heavy development**.### Current Status
* **v0.x**: This version is now in **maintenance mode** and will only receive
security updates.
* **v2.0.0**: Early development phase.### What's Coming in v2
The v2 release will completely transform VSecM by integrating
[SPIKE](https://spike.ist) as the backend storage engine:
* Replace the secrets backing store with [SPIKE](https://spike.ist/)
* Transform **VSecM** into a lifecycle manager and orchestration layer
* Enhanced SPIFFE-native architecture
* Future UI and fleet management capabilities### For Users
- **All users**: Continue using v0.x---it remains stable and will receive
security patches
- **v2.0.0 timeline**: TBD---this is a major rewrite and will take time
- **Contributing**: If you're interested in the v2 architecture, watch the
preview branch but note it's not ready for contributions yet. We will
inform the community when the codebase is ready for contributions.### Note
The v2 branch exists for development purposes only. **Do not attempt to use
it**---it's a work in progress, and nothing is functional yet. We'll announce
when there's something ready to test.Thank you for your understanding and continued support.
----
**Below is the v0.x README**:
----
## About
**VMware Secrets Manager** (*VSecM*) redefines secrets management
for cloud native apps.By using **VSecM** you can `#sleepmore` while keeping your secrets… secret.
Want to get started quickly? [Check out our quickstart tutorial][quickstart].
🐢⚡️
---
[](https://www.bestpractices.dev/projects/7793)
[](https://github.com/vmware/secrets-manager/releases)
[](https://github.com/vmware/secrets-manager/graphs/contributors)
[](https://join.slack.com/t/a-101-103-105-s/shared_invite/zt-287dbddk7-GCX495NK~FwO3bh_DAMAtQ)
[](https://twitch.tv/vadidekivolkan)
[](https://artifacthub.io/packages/helm/vsecm/vsecm)
[](https://github.com/vmware/secrets-manager/blob/main/LICENSE)
[](https://goreportcard.com/report/github.com/vmware/secrets-manager)
[](https://raw.githack.com/wiki/vmware-tanzu/secrets-manager/coverage.html)
[](https://github.com/Everduin94/better-commits)## The Elevator Pitch
[**VMware Secrets Manager**](https://vsecm.com/) is a delightfully-secure
Kubernetes-native secrets store.**VMware Secrets Manager** (*VSecM*) keeps your secrets secret.
With **VMware Secrets Manager**, you can rest assured that your sensitive data
is always **secure** and **protected**.**VMware Secrets Manager** is perfect for securely storing arbitrary
configuration information at a central location and securely dispatching it to
workloads.## Tell Me More
**VMware Secrets Manager** is a cloud-native secure store for secrets
management. It provides a minimal and intuitive API, ensuring practical security
without compromising user experience.**VMware Secrets Manager** is resilient and **secure by default**, storing
sensitive data in memory and encrypting any data saved to disk.[Endorsed by industry experts](https://vsecm.com/community/endorsements/),
**VMware Secrets Manager** is a ground-up re-imagination of secrets management,
leveraging [**SPIFFE**](https://spiffe.io/) for authentication and providing a
cloud-native way to manage secrets end-to-end.## Getting Your Hands Dirty
Before trying **VMware Secrets Manager**, you might want to learn about its
[architecture][architecture] and [design goals][design].Once you are ready to start, [see the Quickstart guide][quickstart].
Or, if you are one of those who "*learn by doing*", you might want to dig into
the implementation details later. If that's the case, you can directly jump to
the fun part and [follow the steps here][installation] to install
**VMware Secrets Manager** to your Kubernetes cluster.## Dive Into Example Use Cases
There are several examples demonstrating **VMware Secrets Manager** sample use
cases [inside the `./examples/` folder](./examples).## Container Images
Pre-built container images of **VMware Secrets Manager** components can be found
at: .## Build VMware Secrets Manager From the Source
[You can also build **VMware Secrets Manager** from the source][build].
## Status of This Software
**VMware Secrets Manager** is under dynamic and progressive development.
The code we've officially signed and released maintains a
high standard of stability and dependability. However, we do encourage
it to be used in a production environment (*at your own risk--[see
LICENSE](LICENSE)*).It's important to note that, technically speaking, **VMware Secrets Manager**
currently holds the status of an *alpha software*. This means that as we
journey towards our milestone of `v1.0.0`, it's possible for changes to
occur--both major and minor. While this might mean some aspects are not backward
compatible, it's a testament to our unwavering commitment to refining and
enhancing **VMware Secrets Manager**.In a nutshell, we are ceaselessly pushing the boundaries of what's possible
while ensuring our software stays dependable and effective for production use.## 🦆🦆🦆 (*Docs*)
* [Official documentation on **vsecm.com**][vsecm].
* [Go Docs on **pkg.go.dev**][pkg-go-dev].## A Note on Security
We take **VMware Secrets Manager**'s security seriously. If you believe you have
found a vulnerability, please [**follow this guideline**][vuln]
to responsibly disclose it.## A Tour Of VMware Secrets Manager
[Check out this quickstart guide][quickstart] for an overview of
**VMware Secrets Manager**.## Community
Open Source is better together.
If you are a security enthusiast, join these communities
and let us change the world together 🤘:* [Join **VMware Secrets Manager**'s Slack Workspace][slack-invite]
* [Join the **VMware Secrets Manager** channel on Kampus' Discord
Server][kampus]## Links
### General Links
* **Homepage and Docs**:
* [**Changelog**][changelog]
* **Community**:
* [Join **VMware Secrets Manage**'s Slack Workspace][slack-invite]
* [Join the **VMware Secrets Manager** channel on Kampus' Discord
Server][kampus]
* [**Contact**][contact]### Guides and Tutorials
* [**Installation and Quickstart**][quickstart]
* [**Local Development Instructions**][use-the-source]
* [**Developer SDK**][sdk]
* [**CLI**][cli]
* [**Architecture**][architecture]
* [**Configuration**][configuration]
* [**Production Deployment Tips**][production]## Installation
[Check out this quickstart guide][quickstart] for an overview of **VMware
Secrets Manager**, which also covers **installation** and **uninstallation**
instructions.You need a **Kubernetes** cluster and sufficient admin rights on that cluster to
install **VMware Secrets Manager**.## Usage
[Here is a list of step-by-step tutorials][about] covers
several usage scenarios that can show you where and how **VMware Secrets
Manager** could be used.## Architecture Details
[Check out this **VMware Secrets Manager Deep Dive**][architecture] article for
an overview of **VMware Secrets Manager** system design and how each component
fits together.## Folder Structure
> *VSecM* == "VMware Secrets Manager for Cloud-Native Apps"
Here are the important folders and files in this repository:
* `./app`: Contains core **VSecM** components' source code.
* `./app/init_container`: Contains the source code for the **VSecM Init
Container**.
* `./app/inspector`: Contains the source code for the **VSecM Inspector**.
* `./app/keygen`: Contains the source code for the **VSecM Keygen**.
* `./app/keystone`: Contains the **VSecM KeyStone** source code.
* `./app/safe`: Contains the **VSecM Safe** source code.
* `./app/sentinel`: Contains the source code for the **VSecM Sentinel**.
* `./app/sidecar`: Contains the source code for the **VSecM Sidecar**.
* `./ci`: Automation and CI/CD scripts.
* `./lib`: Contains independent code that can be used in other projects too.
* `./helm-charts`: Contains **VSecM** helm charts.
* `./core`: Contains core modules shared across **VSecM** components.
* `./dockerfiles`: Contains Dockerfiles for building **VSecM** container images.
* `./examples`: Contains the source code of example use cases.
* `./hack`: Contains scripts for building, publishing, development
, and testing.
* `./k8s`: Contains Kubernetes manifests that are used to deploy **VSecM** and
its use cases.
* `./sdk`: Contains the source code of the **VSecM Developer Go SDK**.
* `./sdk-cpp`: Contains the source code of the **VSecM Developer C++ SDK**.
* `./sdk-java`: Contains the source code of the **VSecM Developer Java SDK**.
* `./sdk-python`: Contains the source code of the **VSecM Developer Python SDK**.
* `./sdk-rust`: Contains the source code of the **VSecM Developer Rust SDK**.
* `./docs`: Contains the source code of the **VSecM Documentation** website
().
* `./CODE_OF_CONDUCT.md`: Contains **VSecM** Code of Conduct.
* `./CONTRIBUTING_DCO.md`: Contains **VSecM** Contributing Guidelines.
* `./SECURITY.md`: Contains **VSecM** Security Policy.
* `./LICENSE`: Contains **VSecM** License.
* `./Makefile`: The `Makefile` used for building,
publishing, deploying, and testing the project.## Branches
There are special long-living branches that the project maintains.
* `main`: This is the source code that is in active development. We try out best
to keep it stable; however, there is no guarantees. We tag stable releases
off of this branch during every release cut.
* `gh-pages`: This branch is where VSecM Helm charts are maintained.
[ArtifactHub][artifacthub] references this branch.
* `docs`: This branch contains versioned documentation snapshots that we take
during releases.
* `tcx`: This is an internal "experimental" branch that is not meant for
public consumption.## Changelog
You can find the changelog and migration/upgrade instructions (*if any*)
on [**VMware Secrets Manager**'s Changelog Page][changelog].## Code Of Conduct
[Be a nice citizen](CODE_OF_CONDUCT.md).
## Contributing
To contribute to **VMware Secrets Manager**,
[follow the contributing guidelines](CONTRIBUTING.md) to get started.Use GitHub issues to request features or file bugs.
## Communications
* [**Slack** is where the community hangs out][slack-invite].
* [Send comments and suggestions to
**feedback@vsecm.com**](mailto:feedback@vsecm.com).## Maintainers
Check out the [Maintainers Page][maintainers] for a list
of maintainers of **VMware Secrets Manager**.Please send your feedback, suggestions, recommendations, and comments to
[feedback@vsecm.com](mailto:feedback@vsecm.com).We'd love to have them.
## License
[BSD 2-Clause License](LICENSE).
[about]: https://vsecm.com/documentation/use-cases/about/ "VSecM Use Cases"
[architecture]: https://vsecm.com/documentation/architecture/philosophy/ "VMware Secrets Manager Architecture"
[artifacthub]: https://artifacthub.io/packages/helm/vsecm/vsecm "VSecM Artifact Hub"
[build]: https://vsecm.com/documentation/development/use-the-source/ "Building, Deploying, and Testing"
[changelog]: https://vsecm.com/timeline/changelog/ "VSecM Changelog"
[cli]: https://vsecm.com/documentation/usage/cli/ "VSecM CLI"
[configuration]: https://vsecm.com/documentation/configuration/overview/ "VSecM Configuration"
[contact]: https://vsecm.com/community/contact/ "Contact"
[design]: https://vsecm.com/documentation/architecture/philosophy/ "VMware Secrets Manager Design Philosophy"
[docs]: https://vsecm.com/
[installation]: https://vsecm.com/documentation/getting-started/installation/ "Install VMware Secrets Manager"
[kampus]: https://discord.gg/kampus
[maintainers]: https://vsecm.com/community/maintainers/ "VSecM Maintainers"
[pkg-go-dev]: https://pkg.go.dev/github.com/vmware/secrets-manager "VSecM Go Docs"
[production]: https://vsecm.com/documentation/production/overview/ "VSecM Production Deployment"
[quickstart]: https://vsecm.com/documentation/getting-started/overview/ "VSecM Quickstart"
[sdk]: https://vsecm.com/documentation/usage/sdk/ "VSecM Developer SDK"
[slack-invite]: https://join.slack.com/t/a-101-103-105-s/shared_invite/zt-287dbddk7-GCX495NK~FwO3bh_DAMAtQ "Join VSecM Slack"
[spire]: https://spiffe.io/ "SPIFFE: Secure Production Identity Framework for Everyone"
[use-the-source]: https://vsecm.com/documentation/development/use-the-source/ "Building, Deploying, and Testing"
[vsecm]: https://vsecm.com/ "VMware Secrets Manager"
[vuln]: https://github.com/vmware/secrets-manager/blob/main/SECURITY.md "VSecM Security Disclosure"