Terraform template for managing Hashicorp Vault config
Makefile 0.69%HCL 92.61%Shell 6.70%
terraform-vault-sample's Introduction
Hi there ๐
Projects
OIDC/IAM
oidc-client: OIDC CLI client for testing/troubleshooting integration with OpenID Connect Providers (e.g. Forgerock, Azure AD, Okta, FAS, etc).
oidc-server: Mock OIDC server for testing integration with OIDC Relying Party (i.e. can be used to mock response from OIDC Providers in dev environments).
cert-monitor: Both CLI and monitoring server for discovering X509 certificates from various sources: TLS, LDAPS, SAML XML Metadata, OIDC JWK URIs, and expose certificates expiration dates as Prometheus metric for monitoring and alerting. As CLI can be used to extract, parse and display X509 certificates from remote sources.
Rust
ghost: Zellij wasm plugin written in rust to launch floating RunCommand panes.
zellij-workspace: Zellij plugin to apply multi tabs layout to current zellij session.
Hashicorp Vault
terraform-vault-sample: Sample Vault configuration in Terraform and tutorial guides to kickstart your Vault setup.
vault-token-monitor: Monitoring server to track Vault tokens' expiration TTLs and exposing them as Prometheus metrics. Additionally adds the ability to auto-renew Vault periodic tokens.
hc-vault-util: CLI tool for Vault Transit secret engine: import private key into Vault Transit, and generate CSR from a Vault Transit backed private key. Vault TUI for kv2 secret engine.
secret-agent Fork of Forgerock secret agent kubernetes operator to add Hashicorp Vault as a KMS.
GitOps
json-patcher: CLI (and interactive terminal UI) tool for managing, previewing, and applying JSON Patch RFC6902 (i.e. same as Kustomize but for arbitrary JSON).
Tools
reveal: General purpose Terminal base decoder (jwt, base64, X509,url encoded, etc).
Algo
foo-bar-challenges: Algorithm challenges from my Google Foobar participation.