|Project Name||Stars||Downloads||Repos Using This||Packages Using This||Most Recent Commit||Total Releases||Latest Release||Open Issues||License||Language|
|Pynamodb||2,177||1||12 days ago||13||June 09, 2022||258||mit||Python|
|A pythonic interface to Amazon's DynamoDB|
|Saw||1,320||2 months ago||13||February 11, 2021||45||mit||Go|
|Fast, multi-purpose tool for AWS CloudWatch Logs|
|Aws||835||3 months ago||2||apache-2.0||Shell|
|A collection of bash shell scripts for automating various tasks with Amazon Web Services using the AWS CLI and jq.|
|Goformation||808||44||5 days ago||62||June 10, 2021||50||apache-2.0||Go|
|GoFormation is a Go library for working with CloudFormation templates.|
|Iam Policy Json To Terraform||685||3 days ago||7||February 06, 2021||10||apache-2.0||Go|
|Small tool to convert an IAM Policy in JSON format into a Terraform aws_iam_policy_document|
|Aws Security Viz||665||8 days ago||176||August 15, 2021||4||mit||Ruby|
|Visualize your aws security groups.|
|Devops Python Tools||659||5 days ago||32||mit||Python|
|80+ DevOps & Data CLI Tools - AWS, GCP, GCF Python Cloud Functions, Log Anonymizer, Spark, Hadoop, HBase, Hive, Impala, Linux, Docker, Spark Data Converters & Validators (Avro/Parquet/JSON/CSV/INI/XML/YAML), Travis CI, AWS CloudFormation, Elasticsearch, Solr etc.|
|Awacs||389||120||23||2 days ago||39||January 01, 2022||14||bsd-2-clause||Python|
|Python library for AWS Access Policy Language creation|
|Nodb||330||1||3 years ago||7||September 26, 2017||14||Python|
|NoDB isn't a database.. but it sort of looks like one.|
|Foremast||277||2||a year ago||392||December 01, 2021||apache-2.0||Python|
|Spinnaker Pipeline/Infrastructure Configuration and Templating Tool - Pipelines as Code.|
Check it out here: https://burner.kiwi
Burner.kiwi is designed to be an easy to use, fast, and lightweight temporary mail service. It purposefully doesn't include tracking code, analytics, or advertising and has a beautiful and responsive UI.
For those wanting to self-host, burner.kiwi is designed to be able to run on both AWS Lambda and normal machines. It has several backing database implementations and can be flexibly configured.
There are three production-ready database implementations: DynamoDB, PostgreSQL and SQLite3.
There are also two email implementations: Mailgun and SMTP. SMTP allows you to receive emails directly at no extra cost but will not work with AWS lambda.
This is project still a work in progress, if you think you can help, see the To Do section.
To run burner.kiwi yourself, you can build a binary or use the official docker image.
To perform a build you must have minify installed, and a working go installation.
Or if you wish to use SQLite3 you must run (this enables CGO for sqlite, the binary produced is capable of connecting to any database):
Run all of burner.kiwi's tests locally:
These are all set as environment variables.
|LISTEN||string||address to listen on. Default is
|LAMBDA||Boolean||Whether or not the binary is being hosted on AWS Lambda|
|KEY||String||Secret key used to sign cookies and keys. Make this something strong!|
|WEBSITE_URL||String||The url where the binary is being hosted. This must be internet reachable as it is the destination for Mailgun routes|
|STATIC_URL||String||The url where static content is being hosted. Set to
|DOMAINS||String||Comma separated list of domains connected to Mailgun account or that have correctly set MX records|
|RESTOREREALIP||Boolean||Restores the real remote ip using the
|BLACKLISTED||String||Comma separated list of domains to reject email from|
|SMTP_LISTEN||String||Listen address for SMTP server (default 25)|
|MG_KEY||String||Mailgun private API key (if using mailgun)|
|MG_DOMAIN||String||One of the domains set up on your Mailgun account (if using mailgun)|
|DATABASE_URL||String||URL for the PostgreSQL database or filename for SQLite3 see documentation here.|
|DYNAMO_TABLE||String||Name of the dynamodb table to use for storage (if using DynamoDB)|
If you are using DynamoDB in a non-AWS environment you need to set these. If you are on AWS you shouldg use IAM roles.
|AWS_ACCESS_KEY_ID||String||Your AWS access key ID corresponding to an IAM role with permission to use DynamoDB|
|AWS_SECRET_ACCESS_KEY||String||AWS secret access key corresponding to your access key ID|
|AWS_REGION||String||The AWS region containing the DynamoDB table. Use the appropriate value from the Region column here.|
If you notice any issues or have anything to add, I would be more than happy to work with you. Create an issue and outline your plans or bugs.
If you think you can help, then create an issue and outline your plans.
Copyright 2018-2022 Hayden Woodhead
Licensed under the MIT License.
The Roger logo is licensed under Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).