All Projects → doomsday-project → doomsday

doomsday-project / doomsday

Licence: Unlicense license
x509 certificate expiration monitoring

Programming Languages

go
31211 projects - #10 most used programming language
javascript
184084 projects - #8 most used programming language
typescript
32286 projects
CSS
56736 projects
HTML
75241 projects
Makefile
30231 projects

Projects that are alternatives of or similar to doomsday

Traefik Certs Dumper
Dump ACME data from Traefik to certificates
Stars: ✭ 220 (+609.68%)
Mutual labels:  certificates
cassler
🕷️ 🕷️ 🕷️ Validate SSL Certificates around web
Stars: ✭ 55 (+77.42%)
Mutual labels:  certificates
azure-iiot-opc-vault-service
Azure Industrial IoT OPC Vault Service
Stars: ✭ 15 (-51.61%)
Mutual labels:  certificates
tls certificate generation
Use temporary Amazon EC2 / Digital Ocean cloud machines to get / renew letsencrypt certificates
Stars: ✭ 28 (-9.68%)
Mutual labels:  certificates
kms-issuer
KMS issuer is a cert-manager Certificate Request controller that uses AWS KMS to sign the certificate request.
Stars: ✭ 43 (+38.71%)
Mutual labels:  certificates
vcert
Go client SDK and command line utility designed to simplify integrations by automating key generation and certificate enrollment using Venafi machine identity services.
Stars: ✭ 69 (+122.58%)
Mutual labels:  certificates
Ca Bundle
The Mozilla CA bundle extracted and converted to PEM. This repository functions as a backup to the automated service on the curl web site.
Stars: ✭ 177 (+470.97%)
Mutual labels:  certificates
ssl-cert-check
Check expiry dates of local and remote SSL certificates
Stars: ✭ 28 (-9.68%)
Mutual labels:  certificates
httpsbook
《深入浅出HTTPS:从原理到实战》代码示例、勘误、反馈、讨论
Stars: ✭ 77 (+148.39%)
Mutual labels:  certificates
airgap
Offline LiveUSB to generate and manage secret keys for things such as gpg, certificates, and cryptocurrency
Stars: ✭ 92 (+196.77%)
Mutual labels:  certificates
vault-pki-monitor-venafi
Venafi PKI Monitoring Secrets Engine for HashiCorp Vault that enforces security policy and provides certificate visiblity to the enterprise.
Stars: ✭ 18 (-41.94%)
Mutual labels:  certificates
bowser
a smart, friendly, secure, and auditable ssh daemon
Stars: ✭ 44 (+41.94%)
Mutual labels:  certificates
learn-ssl
A set of example programs that demonstrate various OpenSSL functions and enable "learning by doing".
Stars: ✭ 15 (-51.61%)
Mutual labels:  certificates
AzureWebAppSSLManager
Acquires and manages free SSL certificates for Azure Web App and Azure Functions applications.
Stars: ✭ 70 (+125.81%)
Mutual labels:  certificates
upmail
Email notification hook for https://github.com/sourcegraph/checkup.
Stars: ✭ 62 (+100%)
Mutual labels:  certificates
Openssl Osx Ca
Simple periodic task to sync OSX Keychain certs to Homebrew installed OpenSSL & LibreSSL
Stars: ✭ 185 (+496.77%)
Mutual labels:  certificates
SecuritySample
(Android) Hide encrypted secret API keys in C/C++ code, retrieve and decrypt them via JNI. Google SafetyNet APIs example.
Stars: ✭ 49 (+58.06%)
Mutual labels:  certificates
Certification
Certificates of Qualification in Software Engineering
Stars: ✭ 41 (+32.26%)
Mutual labels:  certificates
acmed
ACME (RFC 8555) client daemon
Stars: ✭ 121 (+290.32%)
Mutual labels:  certificates
certificate-expiry-monitor-controller
Certificate Expiry Monitor Controller monitors the expiration of TLS certificates used in Ingress.
Stars: ✭ 114 (+267.74%)
Mutual labels:  certificates

Doomsday

Doomsday is a server (and also a CLI) which can be configured to track certificates from different storage backends (Vault, Credhub, Pivotal Ops Manager, or actual websites) and provide a tidy view into when certificates will expire. Doomsday provides no automation for renewal - Doomsday simply provides the information required for maintainers to take action.

Server configuration

Create a configuration manifest and start the server against it with doomsday server -m <pathtomanifest>

The manifest should be written in YAML. An example schema with documentation can be found at docs/ddayconfig.yml

Pushing to CloudFoundry

You'll want to make a directory that has three files.

  • A binary of doomsday for the correct operating system
  • A doomsday server configuration manifest
  • A cf application manifest for deploying doomsday

The binary can be found at the releases page for this Github repo.

An example manifest can be found at docs/ddayconfig.yml. Omit the server.port property from the manifest. This will cause the server to look for the PORT environment variable for which port to have the API listen on (which is what CF wants).

The cf application manifest will probably look something like this, assuming that your binary is called doomsday, and your configuration manifest is called doomsdayconf.yml.

---
applications:
  - name: doomsday
    memory: 256M
    instances: 1
    command: ./doomsday server -m doomsdayconf.yml
    buildpack: binary_buildpack

Then, if your cf app manifest is called manifest.yml, run

cf push -f manifest.yml
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].