Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/ibm-cloud/trusted-profile-enterprise-security
Use trusted profiles as foundation for secure cloud environments
https://github.com/ibm-cloud/trusted-profile-enterprise-security
cloud-security iam ibm-cloud ibm-cloud-cr jwt python
Last synced: 1 day ago
JSON representation
Use trusted profiles as foundation for secure cloud environments
- Host: GitHub
- URL: https://github.com/ibm-cloud/trusted-profile-enterprise-security
- Owner: IBM-Cloud
- License: apache-2.0
- Created: 2023-06-01T11:46:01.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2024-08-02T20:59:12.000Z (4 months ago)
- Last Synced: 2024-08-02T23:33:07.683Z (4 months ago)
- Topics: cloud-security, iam, ibm-cloud, ibm-cloud-cr, jwt, python
- Language: Python
- Homepage: https://cloud.ibm.com/docs/solution-tutorials?topic=solution-tutorials-trusted-profile-for-enterprise-security
- Size: 27.3 KB
- Stars: 0
- Watchers: 10
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Trusted Profiles on IBM Cloud
Some tests of Trusted Profiles with Compute Resources on IBM Cloud.The [app.py](app.py) creates three API functions:
- `localhost:8080/`: check that the app works and return the current app version
- `localhost:8080/api/listresources` with optional query parameter **tpname**: retrieve the service account token, turn it into an IBM Cloud IAM access token, retrieve the list of resources in the cloud account
- `localhost:8080/api/listresources_crn` with optional query parameter **tpname**: the same as the previous, but just return the list of CRNs with other resource data stripped away# Deploy
To deploy, build the container image using the [Dockerfile](Dockerfile), then apply [app.yaml](app.yaml). Note that you need to change the container image specification in that file.As alternative, follow the instructions in the [tutorial](https://cloud.ibm.com/docs/solution-tutorials?topic=solution-tutorials-trusted-profile-for-enterprise-security).
![Architecture diagram](TrustedProfile_with_CR_architecture.svg)
# Test
Once deployed, you can log into the running container:
```
kubectl exec --namespace tptest --stdin --tty tp-demo -- /bin/bash
```Within the container shell use **curl** to access the API:
```
curl localhost:8080
```
or:
```
curl localhost:8080/api/listresources?tpname=TPwithCR
```
or:
```
curl localhost:8080/api/listresources_crn?tpname=TPwithCR
```