credstash
leapp
credstash | leapp | |
---|---|---|
3 | 73 | |
2,054 | 1,537 | |
0.0% | 1.2% | |
0.0 | 9.7 | |
over 2 years ago | 4 days ago | |
Python | TypeScript | |
Apache License 2.0 | Mozilla Public License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
credstash
-
Ask HN: Secure and simple way for secret/credential management in a startup?
Hello,
At my current gig we're using doppler[^1] (no affiliation) for application secrets. We're using doppler with their kubernetes operator which supports auto-rotation on secrets. Secrets are set as "env variables". So far, doppler has not suffer big outages or we did not notice, because the operator will keep working even if their API is down - of course you won't get updates. Access control could be more _fine grained_ and they added secret auto-rotation option recently[^2]. We don't use that yet.
I've been a happy 1Password user (no affiliation) and we use it company wide to share user secrets. 1Password support CI/CD integration IIRC, so in theory should cover most use cases.
If you can pay for AWS Vault, the terraform integration comes out of the box. However if you're a small team running vault might be a daunting task and you're inserting another SPoF.
There are many open source application secrets tools that you could check out though. In the past I had great experience with credstash[^3]. Credstash is a really simple and secure open source solution that is based on AWS KMS, IAM and DynamoDB. Costs pennies to run for medium size deployments. Once you setup and document the way to use it, it's really easy. The downside is that as a tool is pretty _raw_ you have to build things like "secret generators", etc. But combined with a slack bot can be a really powerful, secure, open-source solution.
If you have specific questions about any of the above tools feel free to drop an email. I'll happy to answer questions.
[^1]: https://www.doppler.com/
[^2]: Auto-rotation is complicated because you need to integrate the auto-rotation with external tools yourself most of the times. There are Hashi-Vault modules for SQL DBs but not for Mailgun or CloudFlare for example.
[^3]: https://github.com/fugue/credstash
-
Question: dynanmoDB - Credstash, is there a way to put a cred in that has multi-lines in the value?
Hi, credstash dev here. I think the issue is with your shell not with credstash. You need to pass in an actual newline character into the argument if you want to store a newline.
-
Why should I NOT store customers API keys in DynamoDB?
Link to Credstash if you're curious: https://github.com/fugue/credstash
leapp
-
Ask HN: Who wants to be hired? (March 2024)
Summary:
Do you find yourself overwhelmed with work, requests, or complaints and in need of assistance to alleviate the pressure, enhance communication, facilitate organization, prioritize tasks, and foster greater trust and transparency?
Alternatively, I can work as a full stack developer.
AWS Community builder, AWS User group Leader, public speaker (https://www.youtube.com/watch?v=qdu58NAQfU0&t=271s)
Or perhaps you need both? =)
I have 4+ years of experience as a product manager and 8 in product development (before pm: agile coach, UX designer, and developer).
I've been the co-founder of the open-core company behind the OSS project Leapp (https://github.com/Noovolari/leapp)
Please feel free to reach out.
-
OKTA Identity Engine Upgrade
You can switch to saml2aws using the browser method instead of the Okta method and it will continue to work after the upgrade. There is also a really neat GUI tool to manage your session tokens that also works. https://www.leapp.cloud
-
When using AWS Organizations SSO for multiple accounts (dev, stage, prod) I have a hard time knowing which account I'm currently logged into.
Take a try to Leapp: https://github.com/Noovolari/leapp
-
Ask HN: Should open source projects track you?
Hello everyone, I'm the maintainer of an open-source DeveloperTool (https://github.com/Noovolari/leapp)
With a heuristic of 7000 users daily, I started feeling the need to have more information on how Users are using the project to improve it.
Is it the right thing to do to create a better Developer Experience and gain feedback for the end users?
On a side:
-
Ask HN: Secure and simple way for secret/credential management in a startup?
- For all your employees I can advice you Leapp as open-source project (https://github.com/Noovolari/leapp). It solve mayor of the problem listed here:
-
Alternative Official SDK
I am looking to manage Leapp (https://www.leapp.cloud/) from the StreamDeck. Leapp allows you to manage and switch between different Cloud Accounts (AWS, Azure, etc). Leapp has a command line interface which I could automate with a StreamDeck plugin. Unfortunately it looks like the only official SDK is the sandboxed JavaScript one. This means I cannot automate command line tools with it.
-
What are AWS credentials?
If you’re wondering if there is a tool that allows you to stop thinking about AWS credentials and where to store them in the right way, give a look at Leapp! It takes the responsibility of storing long-term credentials in the system vault, generating/refreshing short-term credentials, and placing them in the right place for the clients to use them.
-
AWS multi-account strategy explained
Still, there is an elementary problem that we need to address, and it’s more on the operational side of things. Once we secured and implemented a tremendous multi-account strategy, how do people access AWS accounts? It turns out there is a fantastic open-source tool that lets you handle that with no effort, and its name is Leapp.
-
AWS Credentials: from Environment Variables to credentials_process
When you have to configure access to multiple AWS accounts using the Assume Role access pattern, it becomes difficult to get rid of all the Named Profiles configuration data and relationships. When you’ve to deal with a complex access scenario, tools like Leapp (https://www.leapp.cloud) come to the rescue! Leapp avoids you to specify relationships between Named Profiles in the config file, as the access methods are stored in the tool-specific configuration file.
-
Multiple active AWS consoles in the same browser with Leapp open-source browser extension (for Firefox and Chrome)
Leapp Github repository
What are some alternatives?
chamber - CLI for managing secrets
aws-vault - A vault for securely storing and accessing AWS credentials in development environments
sshportal - :tophat: simple, fun and transparent SSH (and telnet) bastion server
saml2aws - CLI tool which enables you to login and retrieve AWS temporary credentials using a SAML IDP
gatus - ⛑ Automated developer-oriented status page
lowdefy - The config web stack for business apps - build internal tools, client portals, web apps, admin panels, dashboards, web sites, and CRUD apps with YAML or JSON.
simplelocalize-cli - SimpleLocalize CLI is a developer-friendly command-line tool for uploading and downloading translation files
userscript-youtube-playlist-o
Electron - :electron: Build cross-platform desktop apps with JavaScript, HTML, and CSS
snipp.in - Fast, Light-weight, Notes, Snippet manager and code editor directly inside your browser
knut - knut is an efficient plain text accounting tool with support for multiple currencies and valuation.
intercooler-js - Making AJAX as easy as anchor tags