Displaying 1 to 17 from 17 results

certmagic - Automatic HTTPS for any Go program: fully-managed TLS certificate issuance and renewal

  •    Go

CertMagic is the most mature, robust, and capable ACME client integration for Go. With CertMagic, you can add one line to your Go application to serve securely over TLS, without ever having to touch certificates.

certmagic - Automatic HTTPS for any Go program: fully-managed TLS certificate issuance and renewal

  •    Go

CertMagic is the most mature, robust, and capable ACME client integration for Go... and perhaps ever. With CertMagic, you can add one line to your Go application to serve securely over TLS, without ever having to touch certificates.

ansible-letsencrypt - An ansible role to generate TLS certificates and get them signed by Let's Encrypt

  •    

An ansible role to generate TLS certificates and get them signed by Let's Encrypt. Currently attempts first to use the webroot authenticator, then if that fails to create certificates, it will use the standalone authenticator. This is handy for generating certs on a fresh machine before the web server has been configured or even installed.

pem - Create private keys and certificates with node.js

  •    Javascript

Here are some examples for creating an SSL key/cert on the fly, and running an HTTPS server on port 443. 443 is the standard HTTPS port, but requires root permissions on most systems. To get around this, you could use a higher port number, like 4300, and use https://localhost:4300 to access your server. Please have a look into the API documentation.




acme-dns - Limited DNS server with RESTful HTTP API to handle ACME DNS challenges easily and securely

  •    Go

A simplified DNS server with a RESTful HTTP API to provide a simple way to automate ACME DNS challenges. Many DNS servers do not provide an API to enable automation for the ACME DNS challenges. Those which do, give the keys way too much power. Leaving the keys laying around your random boxes is too often a requirement to have a meaningful process automation.

helm-certgen - Helm plugin for generation of TLS certificates

  •    Go

This repository is for certgen plugin for Kubernetes Helm CLI. This plugin enables TLS certificate generation for helm charts. To use the helm-certgen plugin, the helm charts should have a cert.yaml file which outlines the requirements for certificates (the CSR details, alias names etc.,). The plugin will use these information to generate the certificates and place them as a Kubernetes secret in the appropriate namespace.

acme-dns-certbot-joohoi - Certbot client hook for acme-dns

  •    Python

An example Certbot client hook for acme-dns. This authentication hook automatically registers acme-dns accounts and prompts the user to manually add the CNAME records to their main DNS zone on initial run. Subsequent automatic renewals by Certbot cron job / systemd timer run in the background non-interactively.

tlsproxy - Let's encrypt automatic proxy

  •    Go

TLSproxy makes it trivially simple to secure a web server: it has only one option, to provide your email (sent only to Let's Encrypt). TLSproxy intends to solve a basic use-case: when you need to secure a single webserver with support for virtual hosts. In this case, it does wonders.


keymaster - Short term certificate based identity system (ssh/x509 ca + openidc)

  •    Go

Keymaster is usable short-term certificate based identity system. With a primary goal to be a single-sign-on (with optional second factor with Symantec VIP or U2F tokens) for CLI operations (both SSHD and TLS). From the user's perspective a single command is needed with no flags (after the first run). After running the client command successfully users get a 16h (or less) SSH and TLS certificates. On systems with a running ssh-agent the command also injects the certificate (with matching expiration time) so that no other interaction is needed to start using it with SSH.

private-tls-cert - A simple Terraform module to generate self-signed TLS certificates for private use

  •    HCL

This TLS certificate is meant to be used with private services, such as a web service used only within your company. For publicly-accessible services, especially services you access through a web browser, you should NOT use this module, and instead get certificates from a commercial Certificate Authority, such as Let's Encrypt. If you're unfamiliar with how TLS certificates work, check out the Background section.

trustme - #1 quality TLS certs while you wait, for the discerning tester

  •    Python

You wrote a cool network client or server. It encrypts connections using TLS. Your test suite needs to make TLS connections to itself. trustme is a tiny Python package that does one thing: it gives you a fake certificate authority (CA) that you can use to generate fake TLS certs to use in your tests. Well, technically they're real certs, they're just signed by your CA, which nobody trusts. But you can trust it. Trust me.

kube-csr - Generate, submit, approve, fetch, renew and purge certificates in Kubernetes

  •    Go

But you can also choose to select the steps you want to execute. The garbage collector can be daemonized with the adapted flags.

captagent - 100% Open-Source Packet Capture Agent for HEP

  •    C

Captagent is a powerful, flexible, completely modular HEP packet capture and mirroring framework for RTC, ready for (virtually) any kind of IP protocol and encapsulation method - past, present - and future. If you found a bug or issue with the code, please raise an Issue on the project tracker.

aks-letsencrypt - Guide to setup Let's Encrypt on AKS

  •    

This repository demonstrates how to add Kubernetes Ingress to a cluster in Azure Kubernetes Services. Moreover, it covers adding TLS termination to custom domain (i.e. www.example.com) using Let's Encrypt free services. I own a Visual Studio subscription which gives me monthly Azure credits. I want to optimize the credits usage to run my blog and temporary experiments seamlessly. Additionally, I would like to use my own domain.

estafette-letsencrypt-certificate - Kubernetes controller to retrieve and renews tls certificates from Letsencrypt for annotated Kubernetes secrets

  •    Go

In order to create and renew certificates automatically every 60 days this application decouples that responsibility from any deployments and moves it into the Kubernetes cluster itself. Once it's running put the following annotations on a secret and deploy. The estafette-letsencrypt-certificate application will watch changes to secrets and process those. Once approximately every 300 seconds it also scans all secrets as a safety net.

crlite - WebPKI-level Certificate Revocation via Multi-Level Bloom Filter Cascade

  •    Go

CRLite uses a Bloom filter cascade and whole-ecosystem analysis of the Web PKI to push the entire web’s TLS revocation information to Firefox clients, replacing OCSP for most browser TLS connections, speeding up connection time while continuing to support PKI revocations. The system was originally proposed at IEEE S&P 2017. For details about CRLite, Mozilla Security Engineering has a blog post series, and this repository has a FAQ.

k8s-webhook-cert-manager - Generate certificate suitable for use with any Kubernetes Mutating Webhook

  •    Shell

Script to generate a certificate suitable for use with any Kubernetes Mutating or Validating Webhook. To be able to execute the script in a Kubernetes cluster, it's released as a Docker image and can be executed, for instance, as a Kubernetes Job.






We have large collection of open source products. Follow the tags from Tag Cloud >>


Open source products are scattered around the web. Please provide information about the open source projects you own / you use. Add Projects.