Releases: stechstudio/keep
v1.0.0-beta.4
Changes
- Switched from
--stageto--envoption - Renamed
keep configuretokeep init - Simplified
keep workspace:configuretokeep workspace - Various code improvements and documentation updates
Installation
composer global require stechstudio/keep:v1.0.0-beta.4v1.0.0-beta.3
What's New
Runtime Secrets Injection
- New
keep runcommand executes subprocesses with injected environment variables - Secrets never touch disk - ideal for CI/CD and production deployments
- Supports templates for mixed static/secret configuration
Workspace Personalization
- Filter which vaults and stages appear in your workspace
- Personal settings stored locally, not committed to version control
- Useful for teams with many vaults/stages where developers work with subsets
Web UI Improvements
- Better handling for single-vault setups
- Dynamic column widths in diff view
- Persistent toggle states for masking and colors
- CSS fixes for long secret values
Other Changes
- Permissions now stored locally instead of in versioned config files
- Documentation restructured and streamlined
- Fixed packaged installation autoload paths
v1.0.0-beta.2 - Web UI Release
🚀 Keep Beta 2 - Web UI & Template Management
This introduces a comprehensive Web UI alongside the existing CLI, making secret management more accessible and visual.
✨ Highlights
Web UI
- Full-featured Vue 3 interface with dark theme
- Start with
keep servercommand - Complete CRUD operations with revision history
- Visual diff matrix for comparing across environments
- Import/Export support
Template Management
- CodeMirror-powered editor with syntax highlighting
- Live validation of
{vault:key}placeholders - Auto-generate templates from existing secrets
- Multiple strategies for missing secrets
🎯 Getting Started
# Start the web interface
keep server
# Or use CLI as before
keep shell
keep listNote: This is a beta release. Please report any issues you encounter.
Keep v1.0.0-beta
Keep v1.0.0-beta
Keep is your toolkit for secure, collaborative management of application secrets across environments and teams. This first beta release brings powerful features for managing secrets in AWS SSM Parameter Store and AWS Secrets Manager.
🚀 Key Features
Interactive Shell
- Context-aware shell for rapid secret management
- Tab completion for commands and secret names
- Persistent vault/stage context
- Command aliases (g for get, s for set, etc.)
- Built-in help system
Comprehensive CLI
- Intuitive commands for all secret operations
- Smart prompts when arguments aren't provided
- Helpful error messages with suggestions
- Works seamlessly in CI/CD pipelines
Multi-Vault Support
- AWS SSM Parameter Store driver
- AWS Secrets Manager driver
- Manage secrets across multiple vaults simultaneously
- Environment isolation (local, staging, production, custom stages)
📦 Core Commands
keep shell- Launch the interactive shellkeep set- Store secrets in vaultskeep get- Retrieve individual secretskeep show- List all secrets in a stagekeep copy- Copy secrets between stages/vaults (supports patterns)keep diff- Compare secrets across environmentskeep export- Export to .env files or process templateskeep import- Import from .env fileskeep rename- Rename secrets while preserving valueskeep search- Search for text within secret valueskeep delete- Remove secretskeep verify- Verify vault setup and permissionskeep info- Display configuration details
🎯 Perfect For
- Development Teams: Share secrets securely without committing to git
- DevOps: Manage secrets across multiple AWS accounts and regions
- CI/CD: Export secrets for deployments without hardcoding
- Multi-Environment Apps: Keep development, staging, and production secrets organized
📚 Template System
Keep includes a powerful template system for managing environment files:
# .env.template
APP_NAME=MyApp
DB_HOST={ssm:database-host}
DB_PASSWORD={secretsmanager:db-password}
API_KEY={vault:api-key}Process templates with: keep export --template=.env.template --stage=production --file=.env
🔒 Security First
- Secrets never touch your git repository
- AWS IAM for authentication and authorization
- Encrypted storage in AWS vaults
- Masked values by default in output
- Audit trail in AWS CloudTrail
📦 Installation
composer require stechstudio/keep:^1.0.0-beta🚦 Getting Started
# Configure Keep and your first vault
./vendor/bin/keep configure
# Verify everything is working
./vendor/bin/keep verify
# Start the interactive shell
./vendor/bin/keep shell📖 Documentation
Full documentation available at https://stechstudio.github.io/keep/
Note: This is a beta release. While feature-complete and well-tested, we welcome feedback and bug reports via GitHub Issues.