Our great sponsors
-
tj
Create local WordPress dev sites, manage existing sites, and deploy them, all from the command line.
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
-
go-cloud
The Go Cloud Development Kit (Go CDK): A library and tools for open cloud development in Go.
Some of my first OSS work was also based on Vagrant (https://github.com/ezekg/tj). I eventually turned that into a commercial desktop app, built on top of that CLI project. Ultimately, the project didn't work out, but it was a big step in my open source and entrepreneurial journey.
ty, mitchellh!
I can't speak to the "great company" part but Adam (and co's) current endeavor may interest you: https://hn.algolia.com/?dateRange=pastYear&page=0&prefix=tru...
tl;dr = https://github.com/systeminit/si#readme
I can't speak to the "great company" part but Adam (and co's) current endeavor may interest you: https://hn.algolia.com/?dateRange=pastYear&page=0&prefix=tru...
tl;dr = https://github.com/systeminit/si#readme
Their two most prominent project Terraform and Vault (as listed in first position on their won website) were recently forked:
https://opentofu.org/
https://www.techtarget.com/searchitoperations/news/366563095...
Their other offerings have very strong alternatives.
I use Terraform and will certainly consider going with OpenTofu in the next upgrade.
I got really excited about Consul when I read about it here many years ago. I wrote a ruby library for it (https://github.com/WeAreFarmGeek/diplomat) which became rather popular, and was used by quite a few large organisations. Hashicorp sent me a care package to thank me - a T-shirt and a card signed by Mitchell himself - I wore that T-Shirt until it was threadbare and I still have the card. Its a small thing on the grand scale of things, but it's something I look back on with pride.
Well done to the Hashicorp team for getting to where they are now - by building something new and useful, and by fundamentally not being greedy.
Even when going multi-cloud you can employ different strategies. Vault is definitely one of them, but you can also use federation to exchange one cloud's credentials for another's, giving you the ability to centralize secrets in one of them. You can use a layer of abstraction like GoCloud [0]. You can also build for each cloud separately and decide either not to centralize secrets at all, or build some trivial bespoke tooling to synchronize some of them. I'm not endorsing any of the options, just pointing out that Vault isn't the only one.
https://github.com/google/go-cloud