TheYkk / tfa
tfa is a 2fa cli tool that aims to help you to generate 2fa code on CI/CD pipelines.
☆28Updated 3 years ago
Alternatives and similar repositories for tfa:
Users that are interested in tfa are comparing it to the libraries listed below
- A library for representing OCI image layers in an abstract filesystem☆27Updated 4 years ago
- Example project using SLSA 3 Generic Generator with GoReleaser☆10Updated last year
- Sigstore user stories☆30Updated last year
- A Prometheus-format exporter to report on DockerHub per-image rate limits☆11Updated last month
- ☆22Updated last year
- To manage Docker Content Trust and Notary certificates☆12Updated last week
- Use OpenFaaS functions as Kubernetes Validating Admission Webhook☆23Updated last year
- A Kubewarden Policy that detects usage of deprecated and dropped Kubernetes resources☆16Updated this week
- xDSL Prometheus Exporter☆45Updated 2 years ago
- Terraform provider to write git repositories☆21Updated 5 years ago
- Now you won't miss the moment the domain expires.☆28Updated last week
- Automatic license scanning and reports!☆15Updated 2 years ago
- Speeding up development with glue that brings tools together☆15Updated 2 years ago
- ☆12Updated 3 years ago
- torcx is a boot-time addon manager for immutable systems☆17Updated 2 weeks ago
- (Re)write your bash script in Go and make it testable too☆28Updated 3 years ago
- Fetch encrypted files from S3 bucket and decrypt them using AWS KMS☆13Updated 6 years ago
- status page with very HA in mind and notifier☆19Updated this week
- A list of common Disaster Recovery (DR) scenarios for software companies☆33Updated 3 years ago
- EKS NG AMI Updater is an open source project that can be used to update kubernetes node group images.☆27Updated this week
- ☆12Updated 6 months ago
- Securely store secrets at rest using Hashicorp Vault☆55Updated 2 years ago
- Identity-Aware Proxy☆21Updated 2 years ago
- Experimental wrapper for kubectl☆22Updated last year
- Pluggable generator for creating, using and sharing reusable templates that can be applied directly, generated into operator, helm chart …☆11Updated 4 years ago
- Secure Distributed Thanos Deployment using an Observability Cluster☆39Updated this week
- etcd-k8s-extract takes in an etcd data directory or db file used in kubernetes, extracts the kubernetes resources and then writes the res…☆37Updated 4 months ago
- Home of code related to security of network systems.☆24Updated 3 months ago
- Guitar hero game in terminal.☆26Updated last year
- commandline tool to allow running cronjobs on multiple hosts while ensuring that it only runs once at a time☆57Updated 2 years ago