Simple to use, simple to deploy, one time self destruct messaging service, with hashicorp vault as a backend
-
Updated
Jun 12, 2024 - Go
Simple to use, simple to deploy, one time self destruct messaging service, with hashicorp vault as a backend
Github Action that allows a user to programmatically and dynamically access secrets stored in Hashicorp's Vault Secrets service, and pass them into any workflow.
Terraform Module: HCP Vault Cluster
The Vault Secrets Operator (VSO) allows Pods to consume Vault secrets natively from Kubernetes Secrets.
Creates a complete GitOps-based operational stack on your Kubernetes clusters
🔒 Desktop password manager
A monorepo containing Terraform modules for working with AWS, Azure, and Vault
Terraform module to manage HashiCorp Vault Secrets!
Terraform for Vault component of Hashi@home
Ephemeral HashiCorp Vault Server (raft backend) TLS / PKI Engine for testing and learning
Secrets Store CSI driver for Kubernetes secrets - Integrates secrets stores with Kubernetes via a CSI volume.
vkv enables you to list, compare, move, import, document, backup & encrypt secrets from a HashiCorp Vault KV engine
Multi-cloud Awala Key Store for server-side Node.js apps
CLI utility to manage context for your HashiCorp environments/stacks.
Automate signing SSH host- and client certificates for a more secure and scalable infrastructure.
Extension to Tink Go that provides HashiCorp Vault integration
Migration tool from K8s vanilla secrets to HashiCorp Vault
Run Hashicorp Vault on Azure Functions (with scale-to-zero)
golang crypto.Signer for Trusted Platform Module (TPM) and Google Cloud KMS
Ansible role to install, initialize and unseal Hashicorp Vault
Add a description, image, and links to the hashicorp-vault topic page so that developers can more easily learn about it.
To associate your repository with the hashicorp-vault topic, visit your repo's landing page and select "manage topics."