Package - postgresql-14-vault
Primary informations
Download package: https://repo.pigsty.io/apt/pgsql/trixie/pool/main/v/vault/postgresql-14-vault_0.3.1-1PIGSTY~trixie_amd64.deb (Size: 29.8KiB)| Property | Value |
|---|---|
| Package | postgresql-14-vault |
| Source | vault |
| Version | 0.3.1-1PIGSTY~trixie |
| Architecture | amd64 |
| Maintainer | Ruohang Feng |
| Installed-Size | 96 |
| Depends | postgresql-14, libc6 (>= 2.4), libsodium23 (>= 1.0.12), postgresql-14-pgsodium |
| Provides | postgresql-vault |
| Homepage | https://github.com/supabase/vault |
| Priority | optional |
| Section | database |
| Filename | pool/main/v/vault/postgresql-14-vault_0.3.1-1PIGSTY~trixie_amd64.deb |
| Size | 30492 |
| SHA256 | 17cebf2f9478341380854a0b879dbff18e30bdba59e81b9177e9040505239460 |
| SHA1 | 9cadf6e36741698cd6126ed1371ad8975c3dd64a |
| MD5sum | ebdeda6cab73b7c88ec637c67259adac |
| Description | Extension for storing encrypted secrets in the Vault in PostgreSQL 14 Supabase provides a table called vault.secrets that can be used to store sensitive information like API keys. These secrets will be stored in an encrypted format on disk and in any database dumps. This is often called Encryption At Rest. Decrypting this table is done through a special database view called vault.decrypted_secrets that uses an encryption key that is itself not avaiable to SQL, but can be referred to by ID. Supabase manages these internal keys for you, so you can't leak them out of the database, you can only refer to them by their ids. |
| Description-md5 |