{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"terraform-aws-s3-static-website","owner":"Lupus-Metallum","isFork":false,"description":"Used to publish static website files to an S3 bucket with proper MIME type based on lookup using the file extension. ","allTopics":["aws","terraform","aws-s3","mime","mime-database","mime-types","mime-encoding","static-website","mime-parser","mimetype","mime-type","terraform-module","mimetypes","aws-bucket","aws-bucket-object"],"primaryLanguage":{"name":"HCL","color":"#844FBA"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":2,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-30T14:24:03.468Z"}},{"type":"Public","name":"terraform-aws-cloudfront-lambda-redirect","owner":"Lupus-Metallum","isFork":false,"description":"Redirect domain to another url with a 301 or 302 redirect","allTopics":["nodejs","aws","lambda","node","certificate","aws-lambda","serverless","cdn","https","aws-s3","lambda-functions","serverless-functions","redirect","node-js","redirect-urls","aws-cloudformation","https-redirect"],"primaryLanguage":{"name":"HCL","color":"#844FBA"},"pullRequestCount":0,"issueCount":1,"starsCount":1,"forksCount":1,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-08-08T00:33:22.239Z"}},{"type":"Public","name":"terraform-aws-acm","owner":"Lupus-Metallum","isFork":false,"description":"Used to create a DNS verified ACM certificate by R53 Zone name","allTopics":["aws","acm","dns-validation","aws-acm","aws-acm-certificate"],"primaryLanguage":{"name":"HCL","color":"#844FBA"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":2,"license":"Apache License 2.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-02-16T06:35:08.222Z"}},{"type":"Public","name":"terraform-aws-python-slack-notifications","owner":"Lupus-Metallum","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"HCL","color":"#844FBA"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-10-25T22:37:55.654Z"}},{"type":"Public","name":"terraform-aws-dnssec-kms","owner":"Lupus-Metallum","isFork":false,"description":"A Terraform module to create a KMS key for use with Route53 DNSSEC. ","allTopics":["dns","route53","aws","security","dnssec","aws-route53","dnssec-keygen"],"primaryLanguage":{"name":"HCL","color":"#844FBA"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-10-25T22:35:34.191Z"}},{"type":"Public","name":"terraform-aws-sqs","owner":"Lupus-Metallum","isFork":false,"description":"Flexible Terraform module to create an SQS queue with optional dead-letter queue and Cloudwatch monitoring for dead-letter letter messages ","allTopics":["aws","encryption","aws-kms","sqs","aws-sqs","sqs-queue","encryption-at-rest","sqs-deadletter"],"primaryLanguage":{"name":"HCL","color":"#844FBA"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":2,"license":"Apache License 2.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-10-25T22:35:28.768Z"}},{"type":"Public","name":"terraform-aws-rds-schema-and-user","owner":"Lupus-Metallum","isFork":false,"description":"TF module to create a Schema on RDS Aurora and generate random username and password and write to a secret.","allTopics":["aws","rds","aws-rds","aws-secrets-manager","secrets-manager","rds-aurora","schema"],"primaryLanguage":{"name":"HCL","color":"#844FBA"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-10-25T22:35:24.304Z"}},{"type":"Public","name":"terraform-aws-replicated-s3-bucket","owner":"Lupus-Metallum","isFork":false,"description":"Terraform module to create 2 S3 buckets in a replicated fashion, compliant with logging, versioning and encryption at rest.","allTopics":["aws","aws-s3","s3-bucket","s3-replication"],"primaryLanguage":{"name":"HCL","color":"#844FBA"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-10-25T22:35:21.542Z"}},{"type":"Public","name":"terraform-aws-amazon-managed-prometheus-for-eks","owner":"Lupus-Metallum","isFork":false,"description":"A Terraform Module to create/manage a Amazon Managed Prometheus Workspace, IAM role and Prometheus relay in a designated EKS Cluster.","allTopics":["aws","metrics","amp","helm","prometheus","prometheus-exporter","helm-charts","node-exporter","eks","eks-cluster","aws-amp"],"primaryLanguage":{"name":"HCL","color":"#844FBA"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":4,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-10-25T22:35:16.270Z"}},{"type":"Public","name":"terraform-aws-cloudfront-add-index","owner":"Lupus-Metallum","isFork":false,"description":"Appends index.html to requests that don’t include a file name or extension in the URL","allTopics":[],"primaryLanguage":{"name":"HCL","color":"#844FBA"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-10-25T22:28:42.019Z"}},{"type":"Public","name":"terraform-aws-cloudfront-security-headers","owner":"Lupus-Metallum","isFork":false,"description":"Terraform module to create a Lambda@Edge function to add best practice security headers and support HSTS preload requirements.","allTopics":["aws","security","aws-lambda","terraform","web-security","cloudfront","lambda-edge","terraform-module"],"primaryLanguage":{"name":"HCL","color":"#844FBA"},"pullRequestCount":0,"issueCount":1,"starsCount":2,"forksCount":2,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-10-25T22:28:41.877Z"}},{"type":"Public","name":"terraform-aws-codebuild-project","owner":"Lupus-Metallum","isFork":false,"description":"Used to deploy code build projects with all required/optional configuration","allTopics":[],"primaryLanguage":{"name":"HCL","color":"#844FBA"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-10-25T22:28:40.680Z"}},{"type":"Public","name":"terraform-aws-route53-health-check","owner":"Lupus-Metallum","isFork":false,"description":"This Terraform module creates a Route53 Health Check and if desired a CloudWatch alarm.","allTopics":["aws","monitoring","cloudwatch","aws-cloudwatch","aws-route53","cloudwatch-metrics","aws-cloudwatch-metrics","cloudwatch-alarm","template","terraform","hcl","terraform-modules","terraform-module"],"primaryLanguage":{"name":"HCL","color":"#844FBA"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1,"license":"Apache License 2.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-10-25T22:18:22.847Z"}},{"type":"Public","name":"terraform-aws-ses","owner":"Lupus-Metallum","isFork":false,"description":"Used to create a fully compliant SES domain","allTopics":["aws","terraform","ses","aws-ses","terraform-module"],"primaryLanguage":{"name":"HCL","color":"#844FBA"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":2,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-10-25T22:18:22.463Z"}},{"type":"Public","name":"terraform-aws-r53-zone","owner":"Lupus-Metallum","isFork":false,"description":"TF Module for creating a R53 zone with DNSSEC, optional GitHub verified domain/org, Protonmail support, dmarc and mx records and Amazon CAA record support.","allTopics":["route53","aws","terraform","dkim","protonmail","dmarc","autodiscover","aws-route53","txt","caa","mx","dnssecurity","terraform-module","autodiscovery","dnssec-keygen","protonmail-custom-domain","github-verified-domain","zone","dnssec"],"primaryLanguage":{"name":"HCL","color":"#844FBA"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":3,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-10-25T22:11:06.885Z"}},{"type":"Public","name":".github","owner":"Lupus-Metallum","isFork":false,"description":"","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-07-08T22:24:02.982Z"}},{"type":"Public","name":"brand","owner":"Lupus-Metallum","isFork":false,"description":"","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-09-17T03:09:39.249Z"}},{"type":"Public","name":"lambda-nodejs-slack-echo-bot","owner":"Lupus-Metallum","isFork":false,"description":"A simple slack bot in nodejs to echo back user input from a slash command","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-04-30T02:44:30.017Z"}}],"repositoryCount":18,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Lupus-Metallum repositories"}