Top 17 secrets-manager Open-Source Projects
-
external-secrets
External Secrets Operator reads information from a third-party service like AWS Secrets Manager and automatically injects the values as Kubernetes Secrets.
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
argocd-vault-plugin
An Argo CD plugin to retrieve secrets from Secret Management tools and inject them into Kubernetes secrets
-
SaaSHub
SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives
-
microvault
Keep your secrets secret. Tool to manage secrets in your public and private repositories. :closed_lock_with_key: :fire:
-
envars
Securely load environment variables (configuration settings) from .env files with support of Google Secret Manager.
-
vanishing-keys
Vanishing Keys is the public implementation of how Authress provides One Time Secrets
-
sftp-composer
Application that allows to define simply the secrets to use for AWS SFTP users mapping in secrets manager
-
SaaSHub
SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives
dotenv-vault is another popular package that lets you encrypt your secret and decrypt the file just in time. They are quite helpful for production and CIT environments but are not supported currently.
Project mention: Show HN: Command-line secrets manager powered by macOS keychains | news.ycombinator.com | 2023-08-13
Written in Golang and Svelte.js, this tool provides an excellent starting point for those venturing into open-source contributions, Golang, or Svelte. It's a great place to begin your journey! Check it out: github.com/roshan8/shielded-secrets
GCSecretManager (GitHub) is a Google Apps Script library that allows you to store secrets in Google Cloud Secret Manager. The library also works as a storage for SecretService library. Let's look at three ways to use it.
So we've made an open source and completely free quick solution to share temporary credentials. The source is of course available on GitHub. It's a community edition so everything is free and no account is required.
Project mention: Show HN: Hoop.dev, Golang server for a web database client | news.ycombinator.com | 2024-04-25Hi HN,
I’m Andrios, founder and CEO of Hoopdev, and am excited to show you our web database client with a Go-based language server that’s easy to use and built for teams. As of today, we’re launching our Free plan and anyone can start using it. It works with any browser.
Desktop database clients have always felt clunky to me. After 10 years of programming, I still find myself struggling with basic tasks—like securely configuring access or just trying to pull data from a different device. Every time I'm away from my main setup, it feels like I'm locked out of my own data. These hurdles slow me down and remind me why we need to push for web-based solutions that are not just powerful, but also intuitive and accessible right from the browser.
At Hoopdev we are building a Clojurescript client and Golang server that keeps what’s best about database clients while modernizing the experience in the web. We’ve built
1) Schema navigation and autocompletion that works with any db 2) Grouped outputs: so you can easily copy, search, and share query outputs 3) AI-powered Data Masking and Community-sourced Workflows [0]: so you can build your own middlewares 4) The ability to share your outputs with teammates: no more pasting long unformatted SQL into Slack 5) Runbooks: save your team’s common queries into a Git repo so your teammates can run them form a web form.
We built a new type of language server that runs on Kubernetes, it is a lightweight Golang GRPC proxy that can scan and modify layer 7 packets in real-time (this is what enables real-time AI data masking). UI uses Clojurescript. You can self-host the full solution.
Our business model is to make the database client so useful for individuals and small teams that their companies will want to pay for the team and security features. We will never sell your data.
You will notice that a log-in is required and that we do collect usage data and crash reports. We do so because we’re spinning up backend resources for each user and also to keep improving the product. We’ll soon allow users to opt out of usage data. You can see our privacy policy here [1].
It is early, but we are confident that even today the experience is meaningfully better than in many desktop database clients. Please give it a shot at Hoop.dev and let us know how it goes.
Follow us on Twitter [2]. Let me know what you think! Ask me anything!
[0] https://github.com/hoophq/plugin-secretsmanager [1] https://hoop.dev/docs/more/privacy-policy [2] twitter.com/twitter.com/hoopdotdev
secrets-manager related posts
Index
What are some of the best open-source secrets-manager projects? This list will help you:
Project | Stars | |
---|---|---|
1 | external-secrets | 3,918 |
2 | dotenv-vault | 1,017 |
3 | argocd-vault-plugin | 761 |
4 | kube-secret-syncer | 194 |
5 | scrt | 150 |
6 | awssecretsmanagerui | 40 |
7 | ks | 33 |
8 | shielded-secrets | 21 |
9 | hush_aws_secrets_manager | 19 |
10 | microvault | 12 |
11 | envars | 9 |
12 | SecretService | 7 |
13 | locker | 3 |
14 | serverless | 2 |
15 | vanishing-keys | 2 |
16 | sftp-composer | 0 |
17 | plugin-secretsmanager | 0 |
Sponsored