Displaying 1 to 20 from 29 results

vault-client - A command-line interface to HashiCorp's Vault

  •    Go

vc is a command-line interface to HashiCorp's Vault inspired by pass.To build vault-client you need a Go compiler and Git.

scala-vault - Hashicorp Vault Scala Libraries

  •    Scala

Scala library for working with Hashicorp Vault.This library uses the Dispatch, a lightweight async HTTP client to communicate with Vault.




hashi-helper - Disaster Recovery and Configuration Management for Consul and Vault

  •    Go

hashi-helper is a tool meant to enable Disaster Recovery and Configuration Management for Consul and Vault clusters, by exposing configuration via a simple to use and share hcl format.This will create a hashi-helper binary in your $GOPATH/bin directory.

t-vault - Simplified secrets management solution

  •    Java

T-Vault is built to simplify the process of secrets management. We wanted to build an intuitive and easy to use tool that application developers can easily adopt without sacrificing their agility while still following best practices for secrets management. It uses a few open source products internally including, at its heart Hashicorp Vault. Hashicorp vault provides the core functionality of safely storing secrets at rest and access control to those secrets. T-Vault builds on that base to provide a higher-level of abstraction called Safe. Safes are logical abstractions, internally using the concept of paths within vault. T-Vault simplifies the access management to secrets by hiding away all the complexities of managing polices. A very intuitive web UI provides a nice layer of abstraction and hides all the complexities of managing paths, policies, token management, etc. T-Vault introduces two new personas, a 'Safe User' and 'Safe Administrator'. Safe admins will create Safes and grant access to individuals or a LDAP group or an application. Individuals with access to a Safe can use the web UI or API to do CRUD operations on secrets within their Safe.

vault-quickstart - Some shell scripts to get vault up and running as quickly as possible

  •    Shell

I got tired of repeating the same steps over and over again when setting up a vault server so wrote a basic set of scripts to get up and running with a self-signed certificate and local file backend. The scripts are idempotent so it is possible to modify vars.sh and not rely on the defaults. You can create the required files yourself and everything should still work fine.

vault-kubernetes-authenticator - An app and container for authenticating services to @HashiCorp Vault's via the Kubernetes auth method

  •    Go

The vault-kubernetes-authenticator is a small application/container that performs the HashiCorp Vault kubernetes authentication process and places the Vault token in a well-known, configurable location. It is most commonly used as an init container to supply a Vault token to applications or services that are unaware of Vault. VAULT_ADDR - the address to the Vault server, including the protocol and port (like https://my.vault.server:8200). This defaults to https://127.0.0.1:8200 if unspecified.


cryptr - Cryptr: a GUI for Hashicorp's Vault

  •    HTML

Cryptr is a GUI for Hashicorp's Vault. Using Cryptr, a user may easily interact with their Vault instance's API: reading, creating, and modifying secrets with ease.

docker-vault - Docker Container for Hashicorp's Vault

  •    HCL

This Docker Vault container is using Alpine Linux minimal image and Hashicorp's Vault. Vault uses TCP/8200 by default, so we'll keep that. The demo configuration is listening on all interfaces (not just localhost), and using demo.consul.io as per the getting started docs.

sup3rS3cretMes5age - Simple to use, simple to deploy, one time self destruct messaging service, with hashicorp vault as a backend

  •    Go

A simple, secure self-destructing message service, using HashiCorp Vault product as a backend. Read more about the reasoning behind this project in the relevant blog post.

puppet-vault - Puppet module to manage Vault (https://vaultproject.io)

  •    Ruby

Puppet module to install and run Hashicorp Vault. By default, with no parameters the module will configure vault with some sensible defaults to get you running, the following parameters may be specified to configure Vault. Please see The official documentation for further details of acceptable parameter values.

Vault.NET - .NET API client for vault

  •    CSharp

Vault.NET is an .NET API client for the interacting with Vault. This is a port of the go api client and provides generic methods for interacting with the paths in Vault. Many request/response objects are provided in this package to support different backends. This is in no way an exhaustive list of all the objects. Since the models are the things that are going to most likely change between versions of vault, it may make sense to make your own to service your needs. These may get split into a seperate Nuget package in the future.

hookpick - A tool to manage some operational concepts of Hashicorp Vault

  •    Go

hookpick is a tool to manage some operational concepts of Hashicorp Vault, specifically related to the painful process of unsealing, initialising and rekeying Vault. You provide a configuration file with a map of "datacenters". Each datacenter has a key and an array of hosts. hookpick will perform actions against each of those hosts as you need.

PowerVault - PowerShell Client for HashiCorp Vault

  •    PowerShell

This is a PowerShell client for HashiCorp Vault. It interfaces with the HTTP API and does not require vault.exe. The HTTP API is not stable, so this module is not stable.

hashistack-vagrant - A Vagrant managed VM containing a minimal Hashistack for development

  •    Shell

A Vagrant managed VM based on the demo Vagrantfile used in the Getting Started guide for the Nomad project, which adds Consul, Vault, Fabio load balancer, Nomad UI and Vault UI to form a minimal implementation of a "Hashistack" for local development purposes. The Landrush plugin is used to provide DNS resolution for the Hashistack domain, hashistack.vagrant.

breakglass - A command line tool to provide login credentials from Hashicorp Vault

  •    Go

Breakglass is a tool that will make API calls to Hashicorp Vault servers and then retrieve credentials for you. It's designed to ease the process of getting elevated login credentials for a variety of servers.

kubernetes-secret-manager - Manage secrets with Vault inside a Kubernetes cluster

  •    Go

Typically usernames and passwords to resources are statically tied to a service account. These passwords rarely change and are usually difficult to rotate in an application stack. Sometimes, we're not even sure how many components are utilizing that service account which makes rotate even more difficult and teams end up not changing due to fear of downtime and errors. Ideally we want a solution which allows us to rotate credentials dynamically and do so in a secure well-thought out way.

rhythm - Time-based job scheduler for Apache Mesos

  •    Go

Server is configured using file in JSON format. By default config.json from the current directory is used but it can overwritten using -config parameter. List of available configuration options is available here. Documentation for server API is available here.