- Fix for type initialization error on WindowsPowerShell (Issue #89)
- Fix for disabled user interaction after tab completion (Issue #174)
- Extension vault data streams (Warning, Verbose, etc.) now honor cmdlet stream direction commands (Issue #151)
-
Provide better error message when extension vault does not provide required functions (Issue #137)
-
Provide better error message when running under Windows built-in accounts (Issue #143)
-
SecretManagement now runs in ConstrainedLanguage mode (Issue #144)
-
Set-SecretInfo now takes pipeline input (Issue #129).
-
Extension vaults are now loaded and run in a separate PowerShell runspace session (Issue #144)
-
Extension vaults can now optionally support a
Unlock-SecretVault
function (Issue #147)
Unlock-SecretVault
command added to SecretManagement (Issue #147)
-
Fix manifest license link (Issue #112)
-
Fix help document md to xml file compilation (Issue #90, #106)
-
Remove unnecessary assert in registry write code (Issue #119)
- Add constructor for
SecretInformation
class that accepts metadata as a hash table (Issue #108)
-
Get-Secret
andRemove-Secret
cmdlets now honor theVaultName
parameter from a piped inSecretInformation
object (Issue #97) -
Secret name and vault name autocompletion now correctly handles names with spaces (Issue #91)
- A warning is now displayed when secret cmdlets are used and no vaults are currently registered
-
SecretInformation
class now has a newMetadata
property to support the new secret metadata support (Issue #46) -
Set-Secret
cmdlet now has a new optional-Metadata
property to include additional non-sensitive data associated with a secret (Issue #46) -
New
Set-SecretInfo
cmdlet that takes a-Metadata
property which sets additional non-sensitive data to a secret (Issue #46)
Register-SecretVault
no longer emits error when strict language mode is set (Issue #81)
-
Set-DefaultVault
cmdlet has been renamed toSet-SecretVaultDefault
(Issue #79) -
ReadME.md document now includes installation information (Issue #86)
- Incompatibility with WindowsPowerShell 5.1 (Issue #73)
-
The first extension vault added will automatically be designated the default vault (Issue #61)
-
Unregister-SecretVault
-Name
property now supports string[] type and wild cards (Issue #57,#58) -
Register-SecretVault
now checks-VaultParameters
hashtable for reservedVerbose
entry and throws error if found -
Set-DefaultVault
now has a-ClearDefault
parameter that designates no registered vault as the default vault
Register-SecretVault
now supports a-Description
parameter and registration information will include an optional extension vault description (Issue #46)
-
Get-Secret
-Name
parameter now accepts arguments with wild card characters as literals (Issue #67) -
The
Verbose
parameter switch is now passed to extension vault module functions as anAdditionalParameters
name/value pair (Issue #66) -
Get-SecretVault
-Name
parameter now takes astring[]
type argument (Issue #59) -
Test-SecretVault
-Name
parameter now takes astring[]
type argument and accepts wild card characters (Issue #56) -
Register-SecretVault
now has a-PassThru
parameter to return information on the secret vault just registered
-
When an extension vault is unregistered and if the vault provides a
Unregister-SecretVault
function, that extension vault function will be called before the extension vault is unregistered (Issue #60) -
Vault name and Secret name completers have been added to the cmdlets (Issue #35)
- Windows PowerShell cannot register extension vaults (Error: Cannot bind argument to parameter 'Path' ...)
-
Change SecretVaultInfo
VaultName
property toName
, for consistency -
Test-SecretVault
-Vault
parameter changed to-Name
for consistency
-
Add
-AllowClobber
parameter switch toRegister-SecretVault
, to allow overwriting existing vault -
Register-SecretVault
-Name
parameter is now optional, and will use module name if not provided -
Unregister-SecretVault
now supportsName
parameter argument from pipeline -
Set-DefaultVault
now supportsName
andSecretVaultVaultInfo
parameter arguments from pipeline -
Set-Secret
now supportsSecretInfo
objects from the pipeline -
Add
WhatIf
support toSecret-Secret
-
Add
WhatIf
support toRemove-Secret