aws-vault
sops
aws-vault | sops | |
---|---|---|
49 | 150 | |
8,153 | 15,160 | |
0.8% | 1.6% | |
1.7 | 9.0 | |
2 months ago | 6 days ago | |
Go | Go | |
MIT License | Mozilla Public License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
aws-vault
-
Keep your AWS CLI config fresh with Cog
Undying fondness for aws-vault to securely cache my session credentials.
-
A CLI app that keeps your passwords encrypted and lets you manage them using a single secret
you might want to check https://github.com/99designs/keyring and https://github.com/99designs/aws-vault
-
Cannot use AWS SSO with Terraform
You install aws-vault (https://github.com/99designs/aws-vault), configure it according to the README and make sure you have an SSO entry that is compatible, i.e.:
-
How do you protect your secret keys in your local computer?
I use a aws-vault to switch thought all profiles on all aws account. It support SSO with 2FA.
-
LastPass says DevOps engineer’s hacked computer led to security breach in 2022
Nice! Do I understand this correctly?
You use aws-vault(https://github.com/99designs/aws-vault) and configure it with IAM and MFA with YubiKeys. You configure e.g. the profile jonsmith.
When you run
aws-vault exec jonsmith -- aws s3 ls
it will ask you, e.g. every hour to confirm with YubiKeys and cache the key for one hour. After that the temporary keys expire. Can you also store keys different from AWS?
-
Ask HN: Why most CLIs are not using keyring?
Don't know about kube, but awscli and a few others decouple the idea of getting credentials and doing the actions. You can use the password every time, but a better way is to either use the preconfigured profile or some wrapper which does use the keychain. For example https://github.com/99designs/aws-vault/ supports one-off commands and shell sessions with pre-populated tokens.
-
Recommended script access to AWS
It sounds like you have AWS SSO enabled and need a way to run scripts manually in the terminal. Take a look at the aws-vault project that makes it easy working with multiple AWS accounts.
-
Can I run cdk bootstrap in aws cloudshell?
A tool called aws-vault can fix the "insecure" part.
-
Programatic access with AWS SSO
Take a look at aws-vault, which has support for SSO and running in a docker container.
-
Authenticating to AWS provider
I read the docs on: https://github.com/99designs/aws-vault
sops
-
Pico.sh – Hacker Labs
My script just sets up default .sops.yaml for https://github.com/getsops/sops
You can further edit .sops.yaml(eg have multiple of them) and decide how you split secrets in your directory tree to further customize who can decrypt the secrets.
It works pretty well for prod/dev splits, etc
-
Encrypting your secrets with Mozilla SOPS using two AWS KMS Keys
Mozilla SOPS (Secrets OPerationS) is an open-source command-line tool for managing and storing secrets. It uses secure encryption methods to encrypt secrets at rest and decrypt them at runtime. SOPS supports a variety of key management systems, including AWS KMS, GCP KMS, Azure Key Vault, and PGP. It's particularly useful in a DevOps context where sensitive data like API keys, passwords, or certificates need to be securely managed and seamlessly integrated into application workflows.
-
An opinionated template for deploying a single k3s cluster with Ansible backed by Flux, SOPS, GitHub Actions, Renovate, Cilium, Cloudflare and more!
Encrypted secrets thanks to SOPS and Age
-
Tracking SQLite Database Changes in Git
We do the exact same thing to keep track of some credentials we use sops[1] and AWS KMS to separate credentials by sensitivity, then use the git differ to view the diffs between the encrypted secrets
Definitely not best practice security-wise, but it works well
[1] https://github.com/getsops/sops
-
The Twelve-Factor App
For anyone new to SOPS like I was - https://github.com/getsops/sops
- Storing and managing private keys
-
Show HN: Shello – Wrangle Environment Variables
I've found this is largely solved by strictly separating plain config and secrets, and then having secrets pull from GCP secret manager / vault / whatever.
You can then commit all the config (including the secret identifiers) and it all just works so long as you're authenticated with your secret storage system.
We do this for the live configuration as well in line with Gitops and find it to work well.
If you don't want to use a cloud secret manager you can also use something like https://github.com/getsops/sops to commit the encrypted secrets safely
-
Check your secrets into Git [video]
Basically, the simpler the better --just encrypt your secrets and check them in to version control.
We use SOPS[0] for this, and have found it to be pretty nice.
[0]: https://github.com/getsops/sops
-
How to secure secrets of docker-compose stacks with git?
The answer is that secrets shouldn't be stored in the git repo at all, but somewhere safe like a password manager or Mozilla's SOPS which people seem to love.
-
Is it safe to commit a Terraform file to GitHub?
Unfortunately, the SOPS project is in some sort of a limbo state and there has been quite a long period with limited maintenance and unclear position from Mozilla. Despite the project being accepted into the CNCF, it's still unclear what will happen with it going forward.
What are some alternatives?
awsume - A utility for easily assuming AWS IAM roles from the command line.
sealed-secrets - A Kubernetes controller and tool for one-way encrypted Secrets
leapp - Leapp is the DevTool to access your cloud
Vault - A tool for secrets management, encryption as a service, and privileged access management
powerlevel10k - A Zsh theme
age - A simple, modern and secure encryption tool (and Go library) with small explicit keys, no config options, and UNIX-style composability.
azure-aws-creds - This project allows federated Azure Active Directory roles to be easily used with AWS CLI session credentials
git-crypt - Transparent file encryption in git
aws-cli - Universal Command Line Interface for Amazon Web Services
terraform-provider-sops - A Terraform provider for reading Mozilla sops files
ohmyzsh - 🙃 A delightful community-driven (with 2,300+ contributors) framework for managing your zsh configuration. Includes 300+ optional plugins (rails, git, macOS, hub, docker, homebrew, node, php, python, etc), 140+ themes to spice up your morning, and an auto-update tool so that makes it easy to keep up with the latest updates from the community.
vault-secrets-operator - Create Kubernetes secrets from Vault for a secure GitOps based workflow.