go-cloud
hackingthe.cloud
Our great sponsors
go-cloud | hackingthe.cloud | |
---|---|---|
21 | 11 | |
9,388 | 1,511 | |
0.6% | 3.2% | |
8.5 | 8.9 | |
3 days ago | 14 days ago | |
Go | Dockerfile | |
Apache License 2.0 | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
go-cloud
-
Mitchell reflects as he departs HashiCorp
Even when going multi-cloud you can employ different strategies. Vault is definitely one of them, but you can also use federation to exchange one cloud's credentials for another's, giving you the ability to centralize secrets in one of them. You can use a layer of abstraction like GoCloud [0]. You can also build for each cloud separately and decide either not to centralize secrets at all, or build some trivial bespoke tooling to synchronize some of them. I'm not endorsing any of the options, just pointing out that Vault isn't the only one.
https://github.com/google/go-cloud
-
Deno Queues
> If Google started adding Google Cloud specific primitives natively to Go would you call that forward thinking as well?
Go actually ships with a quite forward thinking SQL interface. It's an abstract interface over a DB, and you just import the "driver" that powers it. The driver conforms to a standard interface, so all of them behave roughly the same.
I think this is what everyone wants from Deno/etc - why can't there also be a KV interface that's universal, or a Queue interface that's universal?
People attempted this w/ go [1], where it attempts to use the same nice experience of the SQL logic, but it never seemed to gain traction.
https://gocloud.dev
-
Event Observer Pattern in Go
github.com/google/go-cloud/pubsub package provides a set of interfaces and tools to work with publish/subscribe messaging. This package allows easy communication between independent components by decoupling the sender and the receiver.
-
Google’s Wire: Automated Dependency Injection in Go
I'm guessing this is a reasonable example of what they're using it for? server.go
-
What's the status of pulumi-cloud https://github.com/pulumi/pulumi-cloud?
https://github.com/google/go-cloud probably out of context, but not IaC but agnostic backend development with Go across multiple clouds
-
Is there a zero-boilerplate zero-configuration cloud serverless framework for Go?
The plan is to have a process for generating AWS CDK targeting Lambda (pluggable providers, but start with AWS CDK, because it's what I use), and to use the Google Cloud Development Kit (also called CDK, but not the same) https://github.com/google/go-cloud to abstract the services.
-
Go Cloud Development Kit
In this post, I will talk about an exciting project maintained by the team that develops the Go language: the Go Cloud Development Kit, also known as the Go CDK.
- GitHub - google/go-cloud: The Go Cloud Development Kit (Go CDK): A library and tools for open cloud development in Go.
-
imagor v1.3 - a high-level Go image processing library using libvips
The API of gocloud.dev, is stable. We are at ariga.io, already use gocloud.dev for internal service, and even in the public for easy adopt multi-clouds provider: https://github.com/ariga/atlas/commit/ef0b0eae65a61375482497ceb9ed9790a469b56e
-
Should we switch to Rust?
On Go, which has a community focused on the cloud, there is even GoCloud, a library with a single, common, and high-level API that allows an application to support any of those clouds and even on-premise alternatives for those services. All can be configurable at deploy time by the infrastructure team.
hackingthe.cloud
-
Cloud penetration testing courses
It’s not quite a course, but Hacking the Cloud has a ton of educational content on cloud pentesting. It leans more towards AWS. https://hackingthe.cloud
- Looking for Cloud Pentesting learning.
-
Specializing in Cloud Security
A bit of a shot in the dark, but Hacking the Cloud might be of interest to you (full disclosure, I maintain the site). It covers a lot of misconfigurations and exploitation techniques in cloud environments (particularly AWS).
-
What blogs do you follow for Azure or Cloud things?
I came across one today about security, which is why I thought about getting a list together! I should have added it 😬 https://hackingthe.cloud/
- hackingthe.cloud
- Hacking-the-Cloud/hackingthe.cloud: An encyclopedia for offensive and defensive security knowledge in cloud native technologies.
- Hacking the Cloud
- Hacking the cloud is a encyclopedia of attacks/tactics/techniques that offensive security professionals can use on their next cloud exploitation adventure. (/r/netsec)
What are some alternatives?
cloudpods - A cloud-native open-source unified multi-cloud and hybrid-cloud platform. 开源、云原生的多云管理及混合云融合平台
endgame - An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share the resources with the entire internet 😈
cloudgamestream - A Powershell one-click solution to enable NVIDIA GeForce Experience GameStream on a cloud machine with a GRID supporting GPU.
json-to-c-sharp - Convert a JSON String to C# String.
ungoogled-chromium-portable - 🚀 Ungoogled Chromium portable for Windows
learn-to-cloud - Learn the fundamentals of cloud computing
aws-sdk-go - AWS SDK for the Go programming language.
AzureStaticWebApp-CSharp-SimpleDemo - Simple Azure Static Web App demo done In C# for the videos series: aka.ms/StaticWebAppsTips
fss3 - FSS3 is an S3 filesystem abstraction layer for Golang
THC-Archive - All releases of the security research group (a.k.a. hackers) The Hacker's Choice
leapp-daemon - Leapp-daemon is the core Business logic of the Leapp project.
Pulumi - Pulumi - Infrastructure as Code in any programming language. Build infrastructure intuitively on any cloud using familiar languages 🚀