Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
Pynamodb | 2,177 | 1 | 12 days ago | 13 | June 09, 2022 | 258 | mit | Python | ||
A pythonic interface to Amazon's DynamoDB | ||||||||||
Saw | 1,320 | 2 months ago | 13 | February 11, 2021 | 45 | mit | Go | |||
Fast, multi-purpose tool for AWS CloudWatch Logs | ||||||||||
Aws | 835 | 3 months ago | 2 | apache-2.0 | Shell | |||||
A collection of bash shell scripts for automating various tasks with Amazon Web Services using the AWS CLI and jq. | ||||||||||
Goformation | 808 | 44 | 5 days ago | 62 | June 10, 2021 | 50 | apache-2.0 | Go | ||
GoFormation is a Go library for working with CloudFormation templates. | ||||||||||
Iam Policy Json To Terraform | 685 | 3 days ago | 7 | February 06, 2021 | 10 | apache-2.0 | Go | |||
Small tool to convert an IAM Policy in JSON format into a Terraform aws_iam_policy_document | ||||||||||
Aws Security Viz | 665 | 8 days ago | 176 | August 15, 2021 | 4 | mit | Ruby | |||
Visualize your aws security groups. | ||||||||||
Devops Python Tools | 659 | 5 days ago | 32 | mit | Python | |||||
80+ DevOps & Data CLI Tools - AWS, GCP, GCF Python Cloud Functions, Log Anonymizer, Spark, Hadoop, HBase, Hive, Impala, Linux, Docker, Spark Data Converters & Validators (Avro/Parquet/JSON/CSV/INI/XML/YAML), Travis CI, AWS CloudFormation, Elasticsearch, Solr etc. | ||||||||||
Awacs | 389 | 120 | 23 | 2 days ago | 39 | January 01, 2022 | 14 | bsd-2-clause | Python | |
Python library for AWS Access Policy Language creation | ||||||||||
Nodb | 330 | 1 | 3 years ago | 7 | September 26, 2017 | 14 | Python | |||
NoDB isn't a database.. but it sort of looks like one. | ||||||||||
Foremast | 277 | 2 | a year ago | 392 | December 01, 2021 | apache-2.0 | Python | |||
Spinnaker Pipeline/Infrastructure Configuration and Templating Tool - Pipelines as Code. |
A temporary email service and API built in Go. No JavaScript. No tracking. No analytics. No bullshit.
Check it out here: https://burner.kiwi
Burner.kiwi is designed to be an easy to use, fast, and lightweight temporary mail service. It purposefully doesn't include tracking code, analytics, or advertising and has a beautiful and responsive UI.
For those wanting to self-host, burner.kiwi is designed to be able to run on both AWS Lambda and normal machines. It has several backing database implementations and can be flexibly configured.
There are three production-ready database implementations: DynamoDB, PostgreSQL and SQLite3.
There are also two email implementations: Mailgun and SMTP. SMTP allows you to receive emails directly at no extra cost but will not work with AWS lambda.
This is project still a work in progress, if you think you can help, see the To Do section.
To run burner.kiwi yourself, you can build a binary or use the official docker image.
To perform a build you must have minify installed, and a working go installation.
make build
Or if you wish to use SQLite3 you must run (this enables CGO for sqlite, the binary produced is capable of connecting to any database):
make build-sqlite
Run all of burner.kiwi's tests locally:
make test
These are all set as environment variables.
Parameter | Type | Description |
---|---|---|
LISTEN | string | address to listen on. Default is :8080 which is all interfaces, port 8080 |
LAMBDA | Boolean | Whether or not the binary is being hosted on AWS Lambda |
KEY | String | Secret key used to sign cookies and keys. Make this something strong! |
WEBSITE_URL | String | The url where the binary is being hosted. This must be internet reachable as it is the destination for Mailgun routes |
STATIC_URL | String | The url where static content is being hosted. Set to /static to have the binary serve it. Otherwise set to a full domain name with protocol e.g https://static.example.com
|
DEVELOPING | Boolean | Set to true to disable HSTS and set Cache-Control to zero. |
DOMAINS | []String | Comma separated list of domains connected to Mailgun account or that have correctly set MX records |
RESTOREREALIP | Boolean | Restores the real remote ip using the CF-Connecting-IP header. Set to true to enable, false by default |
BLACKLISTED | []String | Comma separated list of domains to reject email from |
Parameter | Type | Description |
---|---|---|
EMAIL_TYPE | String | One of mailgun or smtp
|
SMTP_LISTEN | String | Listen address for SMTP server (default 25) |
MG_KEY | String | Mailgun private API key (if using mailgun) |
MG_DOMAIN | String | One of the domains set up on your Mailgun account (if using mailgun) |
Parameter | Type | Description |
---|---|---|
DB_TYPE | String | One of memory , postgres , sqlite3 or dynamo for InMemory, PostgreSQL, SQLite3 (not this requires building with SQLite3 support) and DynamoDB respectively |
DATABASE_URL | String | URL for the PostgreSQL database or filename for SQLite3 see documentation here. |
DYNAMO_TABLE | String | Name of the dynamodb table to use for storage (if using DynamoDB) |
If you are using DynamoDB in a non-AWS environment you need to set these. If you are on AWS you shouldg use IAM roles.
Parameter | Type | Description |
---|---|---|
AWS_ACCESS_KEY_ID | String | Your AWS access key ID corresponding to an IAM role with permission to use DynamoDB |
AWS_SECRET_ACCESS_KEY | String | AWS secret access key corresponding to your access key ID |
AWS_REGION | String | The AWS region containing the DynamoDB table. Use the appropriate value from the Region column here. |
If you notice any issues or have anything to add, I would be more than happy to work with you. Create an issue and outline your plans or bugs.
If you think you can help, then create an issue and outline your plans.
Thanks to:
Copyright 2018-2022 Hayden Woodhead
Licensed under the MIT License.
The Roger logo is licensed under Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).