Across the Great Wall we can reach every corner in the world
bbr unixbench benchmark backup l2tp auto-transfer-backup kms shellConfidant is a open source secret management service that provides user-friendly storage and access to secrets in a secure way, from the developers at Lyft. Confidant stores secrets in an append-only way in DynamoDB, generating a unique KMS data key for every revision of every secret, using Fernet symmetric authenticated cryptography.
secret-store password-management certificate-management tokens certificate secret aws kmsWraps the whole helm command. Slow on multiple value files. Run decrypted command on specific value files.
kubernetes encryption kms vault helm pgp secret-management secrets kubernetes-secrets k8s helm-charts vault-client decryption encryption-tool secrets-stored helm-plugin helm-plugins sops secrets-management helm-chartA small utility to sign vanilla node.js http(s) request options using Amazon's AWS Signature Version 4.Can also be used in the browser.
amazon aws signature s3 ec2 autoscaling cloudformation elasticloadbalancing elb elasticbeanstalk cloudsearch dynamodb kinesis lambda glacier sqs sns iam sts ses swf storagegateway datapipeline directconnect redshift opsworks rds monitoring cloudtrail cloudfront codedeploy elasticache elasticmapreduce elastictranscoder emr cloudwatch mobileanalytics cognitoidentity cognitosync cognito containerservice ecs appstream keymanagementservice kms config cloudhsm route53 route53domains logsAn open source, GitOps, zero-trust secrets encryption and decryption solution for Kubernetes applications. Kamus enable users to easily encrypt secrets than can be decrypted only by the application running on Kubernetes. The encryption is done using strong encryption providers (currently supported: Azure KeyVault, Google Cloud KMS and AES). To learn more about Kamus, check out the blog post and slides. If you're running Kamus locally the Kamus URL will be like http://localhost:<port>. So you need to add --allow-insecure-url flag to enable http protocol.
kubernetes-secrets appsec gitops devops kubernetes kmsDeveloped and used in all environments in BaseCRM. We store secrets and values in helm_vars dir structure just like in this repository example dir. All this data versioned in GIT. Working in teams on multiple projects/regions/envs and multiple secrets files at once. We have Makefile in our Helm charts repo to simplify install helm-secrets plugin with helm and other stuff we use. Same Makefile used to rebuild all helm charts with dependencies and some other everyday helpers. Encrypting, Decrypting, Editing secrets on local clones, making #PR's and storing this in our helm charts repo encrypted with PGP, AWS KMS and GCP KMS. Deploying using helm-wrapper from local or from CI with same charts and secrets/values from GIT repository.
helm helm-plugin kubernetes k8s helm-charts kubernetes-secrets sops pgp kms encryption-tool encryption decryption secret-management secrets secrets-storedThe Amazon S3 Encryption Client (http://docs.aws.amazon.com/kms/latest/developerguide/services-s3.html#sse-client) currently only exists for Java and Ruby. This library implements KMS envelope encryption (http://docs.aws.amazon.com/kms/latest/developerguide/workflow.html) for Javascript, adding an option to choose the cipher algorithm and the S3 objects encoding. It exposes getObject and putObject from the AWS S3 client, with KMS encryption options for client-side encryption. Functions exactly the same as http://docs.aws.amazon.com/AWSJavaScriptSDK/latest/AWS/S3.html#getObject-property, except that it will transparently decrypt the object if a KMS key is present in its Metadata. Additional params are as follows.
kms s3 envelope-encryption encryption-clientSecretary helps solve the problem of secrets distribution and authorization in highly dynamic container and VM environments. NaCL and AWS Key Management Service (KMS) are supported crypto backends and can be mixed freely. In a standalone setup the secretary client performs decryption using either local NaCL keys or by calling the AWS Key Management Service.
encrypt-secrets decrypt-secrets docker-image docker container secrets secret-management kmsThis plugin automatically creates a .env file during deployment by merging environment variables from one or more YAML files. During runtime these variables can then be loaded into process.env using dotenv. For a brief introduction, read our blogpost about introducing serverless-env-generator.
serverless-plugin environment-variables credentials encryption aws aws-kms serverless env environment secrets kmsValec is a CLI tool to handle application secrets securely using AWS DynamoDB and KMS. Valec enables you to manage application secrets in your favorite VCS. Set up DynamoDB and KMS (first time only).
aws secret-management secrets dynamodb kmsA Serverless plugin which encrypts Lambda environment variables using an KMS key which is automatically generated for each stage. The plugin will look for a KMS key with alias DEV-my-service, and create it if it does not exist. Then it will go through all environment variables within provider and each function. If it finds an entry in custom.encrypted with a matching name it will use the KMS key to encrypt the value (eg: custom.encrypted.SECRET_PASSWORD) and update the provider and function values.
serverless-plugin serverless kms lambda-encryptedWayland client and server libraries for Liri OS.
qt5 kms qpa-plugin wayland drm raspberrypi qml qt-quick qtThis is a community based project, which was released on MDL and got several patches from me and other people. The goal isn't to bypass Windows activation, the project is for research and to (if used) activation KMS with a legit key, it simplify the activation process. OEM installation: $oem$ folder for pre-activating the system during install. Copy $oem$ to "sources" folder in the install media (iso/usb) use SppExtComObjPatcher.cmd if you want to uninstall the project afterwards.
kms windows-kms windows-activation volume enterprise ltsc ltsb key-management-serviceA JavaScript implementation of Key Management Service (KMS) for current web browsers and node.js-based servers. The KMS API is described in [draft-abiggs-saag-key-management-service-02]. This library uses Promises for many operations.
kms crypto joseUniversal cryptographic tool with AWS KMS, GCP KMS and Azure Key Vault support. For binaries please visit the Releases Page.
cloud-native kubernetes aws gcp azure cryptography kmsTerraform module for providing read and write access to the AWS SSM Parameter Store. This project is part of our comprehensive "SweetOps" approach towards DevOps.
terraform terraform-modules chamber ssm kms secrets-management secretsalibaba cloud kms client for node.js
alibaba-cloud kms sdkCloud KMS allows you to keep encryption keys in one central cloud service, for direct use by other cloud resources and applications. With Cloud KMS you are the ultimate custodian of your data, you can manage encryption in the cloud the same way you do on-premises, and you have a provable and monitorable root of trust over your data. Select or create a Cloud Platform project.
google-apis-client google-api-client google-apis google-api google google-cloud-platform google-cloud cloud google-kms kms google-cloud-key-management-service-(kms)-apiRun keystash --help to see short switches. Use this module in npm scripts.
aws s3 kms secrets env environment variables encryption crypto envelope
We have large collection of open source products. Follow the tags from
Tag Cloud >>
Open source products are scattered around the web. Please provide information
about the open source projects you own / you use.
Add Projects.