A comprehensive, secure development environment management tool built in Rust.
- Secure environment management with encryption
- Multi-factor authentication support
- Cloud provider integration (AWS)
- Geolocation-based access control
- Advanced security features
- Email notifications
- Audit logging
- Recovery code system
- Rust 1.70 or higher
- PostgreSQL 13 or higher
- Redis 6 or higher
- SMTP server access for email notifications
- Clone the repository:
git clone https://github.com/yourusername/forge-dev-env-manager.git
cd forge-dev-env-manager- Copy the environment template:
cp .env.template .env- Edit the
.envfile with your configuration:
- Database credentials
- AWS credentials (if using cloud features)
- SMTP settings
- Security keys
- Other configuration options
- Create the database:
createdb forge_db- Build the project:
cargo build --release- Start the application:
./target/release/dev-env-manager- Create an admin user:
./target/release/dev-env-manager user create --username admin --role administrator- Always use strong passwords and keep them secure
- Enable MFA for administrative accounts
- Regularly rotate security keys
- Monitor audit logs
- Keep the application and dependencies updated
- Use HTTPS in production
- Follow the principle of least privilege
The application uses a layered configuration system:
- Default configuration (
config/default.toml) - Environment-specific configuration (
config/{environment}.toml) - Local configuration (
config/local.toml) - Environment variables
- Command line arguments
See .env.template for all available environment variables and their descriptions.
- Install development dependencies:
cargo install --path .- Run tests:
cargo test- Run with development configuration:
cargo run- Fork the repository
- Create a feature branch
- Make your changes
- Run tests
- Submit a pull request
This project is licensed under the MIT License - see the LICENSE file for details.
For support, please open an issue in the GitHub repository or contact the maintainers.