Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
Cashier | 661 | 3 months ago | 1 | July 08, 2019 | 28 | mit | Go | |||
A self-service CA for OpenSSH | ||||||||||
Hashi Up | 498 | 7 months ago | 32 | September 06, 2022 | 3 | mit | Go | |||
bootstrap HashiCorp Consul, Nomad, or Vault over SSH < 1 minute | ||||||||||
Bitwarden Ssh Agent | 406 | 2 months ago | 8 | mit | Python | |||||
Small python script to load bitwarden-store ssh keys into ssh-agent | ||||||||||
Vault Ssh Helper | 394 | 2 months ago | 11 | February 17, 2021 | 13 | mpl-2.0 | Go | |||
Vault SSH Agent is used to enable one time keys and passwords | ||||||||||
Ssh Vault | 376 | 3 months ago | September 06, 2017 | 12 | bsd-3-clause | Go | ||||
🌰 encrypt/decrypt using ssh keys | ||||||||||
Vaulted | 226 | 1 | 3 years ago | 4 | April 28, 2017 | 25 | mit | Go | ||
Spawning and storage of secure environments | ||||||||||
Ops Cli | 180 | 3 months ago | 44 | October 14, 2021 | 18 | apache-2.0 | Python | |||
Ops - cli wrapper for Terraform, Ansible, Helmfile and SSH for cloud automation | ||||||||||
Vault | 174 | 5 years ago | 7 | Shell | ||||||
🔐 Secret store to be used on Docker image building | ||||||||||
Terraform Azurerm Compute | 154 | 3 days ago | 5 | mit | HCL | |||||
Terraform Azure RM Compute Module | ||||||||||
Nomad_jobs | 116 | a day ago | apache-2.0 | HCL | ||||||
A collection of Nomad Jobds to run as part of the meanstack-consul-connect demo |
hashi-up is a lightweight utility to install HashiCorp Consul, Nomad or Vault on any remote Linux host. All you need is ssh
access and the binary hashi-up
to build a Consul, Nomad or Vault cluster.
The tool is written in Go and is cross-compiled for Linux, Windows, MacOS and even on Raspberry Pi.
This project is heavily inspired on the work of Alex Ellis who created k3sup, a tool to to get from zero to KUBECONFIG with k3s
This tool uses ssh
to install HashiCorp Consul, Nomad or Vault to a remote Linux host. You can also use it to join existing Linux hosts into a Consul, Nomad, Vault or Boundary cluster. First, Consul, Nomad or Vault is installed using a utility script, along with a minimal configuration to run the agent as server or client.
hashi-up
was developed to automate what can be a very manual and confusing process for many developers, who are already short on time. Once you've provisioned a VM with your favourite tooling, hashi-up
means you are only 60 seconds away from running nomad status
on your own computer.
hashi-up
hashi-up
is distributed as a static Go binary.
You can use the installer on MacOS and Linux, or visit the Releases page to download the executable for Windows.
curl -sLS https://get.hashi-up.dev | sh
sudo install hashi-up /usr/local/bin/
hashi-up version
The hashi-up
tool is a client application which you can run on your own computer. It uses SSH to connect to remote servers when installing HashiCorp Consul or Nomad. Binaries are provided for MacOS, Windows, and Linux (including ARM).
By default, hashi-up
talks to an SSH agent on your host via the SSH agent protocol. This saves you from typing a passphrase for an encrypted private key every time you connect to a server.
The ssh-agent
that comes with OpenSSH is commonly used, but other agents, like gpg-agent or yubikey-agent are supported by setting the SSH_AUTH_SOCK
environment variable to the Unix domain socket of the agent.
The --ssh-target-key
flag can be used when no agent is available or when a specific private key is preferred.
The --ssh-target-user
and --ssh-target-password
flags allow you to authenticate using a username and a password.
Deploying a highly-available Nomad cluster with hashi-up!
Building a Nomad cluster on Raspberry Pi running Ubuntu server