Skip to content

Latest commit

 

History

History
22 lines (16 loc) · 1.32 KB

secrets.md

File metadata and controls

22 lines (16 loc) · 1.32 KB

How sharing secrets works

we've got one file in repo called secrets.json, for brigade secret purposes, whole file is forwarded as secret to brigade project. Worker gets aws-details so using kms is able to decrypt file via sops.

Editing secrets

  • within nix-shell run sops secrets.json - will provide extra script for it latter (#TODO)

keeping secrets in git

As docker credentials files are rubbish, there is a secret integration with sops. It allow to integrate with all cloud providers. I believe (at least for now) that keeping master password in cloud provider is way to go. Another way would be to go with gpg but I want to expect from anyone to install it to start.

Some reads

To consider

but ... cases like rotation/ /when someone is leaving might be trickier

Note about showing arn for KMS

  • you are sharing just a reference and you have to have a account added to this reference, so if your credentials does not leak then should be fine - need to read more.