{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"terraform-aws-base-vpc-network","owner":"MagusDevOps","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"HCL","color":"#844FBA"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":3,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-03-31T20:44:25.946Z"}},{"type":"Public","name":"veep-helm","owner":"MagusDevOps","isFork":false,"description":"","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-01-30T04:36:50.283Z"}},{"type":"Public","name":"terraform-aws-ecr-mirror","owner":"MagusDevOps","isFork":true,"description":"A Terraform module that performs a local docker pull and push to a given AWS ECR repository","allTopics":[],"primaryLanguage":{"name":"HCL","color":"#844FBA"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":7,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-01-23T14:04:54.704Z"}},{"type":"Public","name":"avro4k-kafka-serializer","owner":"MagusDevOps","isFork":true,"description":"A Kafka Serializer and SerDe implementation based on Avro4k serializers","allTopics":[],"primaryLanguage":{"name":"Kotlin","color":"#A97BFF"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":8,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-12-07T08:59:54.034Z"}},{"type":"Public","name":"avro4k-build-plugins","owner":"MagusDevOps","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Kotlin","color":"#A97BFF"},"pullRequestCount":0,"issueCount":1,"starsCount":0,"forksCount":1,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-11-11T21:19:46.418Z"}},{"type":"Public","name":"pre-commit-terraform","owner":"MagusDevOps","isFork":true,"description":"pre-commit git hooks to take care of Terraform configurations","allTopics":[],"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":521,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-10-02T22:56:07.615Z"}},{"type":"Public","name":"terraform-aws-lambda-glue-trigger-role","owner":"MagusDevOps","isFork":false,"description":"an opinionated module for a global role for lambda to trigger glue jobs","allTopics":[],"primaryLanguage":{"name":"HCL","color":"#844FBA"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-09-28T20:35:31.823Z"}},{"type":"Public","name":"terraform-aws-namespace-base-security","owner":"MagusDevOps","isFork":false,"description":"provides an opinionated module to create a namespace containing namespace-kms-key, and namespace roles(read, techincal, and ops)","allTopics":[],"primaryLanguage":{"name":"HCL","color":"#844FBA"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-09-14T16:02:32.022Z"}},{"type":"Public","name":"terraform-aws-namespace-kms-base","owner":"MagusDevOps","isFork":false,"description":"provides an opinionated module to create a namespace kms key and alias that work in conjuncture with the namespace roles","allTopics":["aws","kms","terraform","terraform-aws"],"primaryLanguage":{"name":"HCL","color":"#844FBA"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-09-14T16:01:43.148Z"}},{"type":"Public","name":"terraform-aws-namespace-ops-role","owner":"MagusDevOps","isFork":false,"description":"provides an opinionated module to create a namespace based admin role for an AWS account restricted by namespace and prefix tags; with the ability to restrict role assumption to corporate networks","allTopics":["aws","terraform","sts","iam-policy","iam-role","terraform-aws"],"primaryLanguage":{"name":"HCL","color":"#844FBA"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-09-14T16:01:28.284Z"}},{"type":"Public","name":"terraform-aws-namespace-read-role","owner":"MagusDevOps","isFork":false,"description":"provides an opinionated module to create a namespace based read role for an AWS account with access to KMS keys for the namespace and prefix; with the ability to restrict role assumption to corporate networks","allTopics":["aws","terraform","iam","sts","iam-role","terraform-aws"],"primaryLanguage":{"name":"HCL","color":"#844FBA"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-09-14T16:01:05.581Z"}},{"type":"Public","name":"terraform-aws-namespace-service-role","owner":"MagusDevOps","isFork":false,"description":"provides an opinionated module to create a namespace service role for ec2 and lambdas with general prefix and namespace access for KMS, S3, SNS, SQS, SES, SecretsManager, SSM parameter store, and core SSM for creating ec2 sessions.","allTopics":["aws","terraform","iam","sts","iam-role","terraform-aws"],"primaryLanguage":{"name":"HCL","color":"#844FBA"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-09-14T16:00:29.793Z"}},{"type":"Public","name":"terraform-aws-namespace-technical-role","owner":"MagusDevOps","isFork":false,"description":"provides an opinionated module to create a namespace based technical role for an AWS account restricted by resources paths, similar permissions to the service account; with the ability to restrict role assumption to corporate networks","allTopics":["aws","terraform","iam","iam-role","terraform-aws"],"primaryLanguage":{"name":"HCL","color":"#844FBA"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-09-14T16:00:10.118Z"}},{"type":"Public","name":"terraform-aws-ops-role","owner":"MagusDevOps","isFork":false,"description":"provides an opinionated module to create an admin role for an AWS account with the ability to restrict role assumption to corporate networks","allTopics":["aws","terraform","iam","sts","iam-role","terraform-aws"],"primaryLanguage":{"name":"HCL","color":"#844FBA"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-09-14T15:59:53.976Z"}}],"repositoryCount":14,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"MagusDevOps repositories"}