Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commit9eab589

Browse files
committed
improve English
1 parentf25c612 commit9eab589

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

‎docs/secrets.md‎

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -22,14 +22,14 @@ For most, this workflow is simply:
2222

2323
<ahref="./templates#parameters">Template parameters</a> are a dangerous way to accept secrets.
2424
We show parameters in cleartext around the product. Assume anyone with view
25-
access toyour workspace can also see parameters.
25+
access toa workspace can also see its parameters.
2626

2727
##Dynamic Secrets
2828

2929
Dynamic secrets are attached to the workspace lifecycle and require no setup by
3030
the end user.
3131

32-
They can be implemented innative Terraform like so:
32+
They can be implemented inyour template code like so:
3333

3434
```hcl
3535
resource "twilio_iam_api_key" "api_key" {
@@ -40,7 +40,7 @@ resource "twilio_iam_api_key" "api_key" {
4040
resource "coder_agent" "dev" {
4141
# ...
4242
env = {
43-
# Let users access the secret via#TWILIO_API_SECRET
43+
# Let users access the secret via$TWILIO_API_SECRET
4444
TWILIO_API_SECRET = "${twilio_iam_api_key.api_key.secret}"
4545
}
4646
}
@@ -49,7 +49,7 @@ resource "coder_agent" "dev" {
4949
This method is limited to[services with Terraform providers](https://registry.terraform.io/browse/providers).
5050

5151
A catch-all variation of this approach is dynamically provisioning a cloud service account (e.g[GCP](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/google_service_account_key#private_key))
52-
for each workspace and thenmake the relevant secrets available via the cloud's secret management
52+
for each workspace and thenmaking the relevant secrets available via the cloud's secret management
5353
system.
5454

5555
##Coder SSH Key

0 commit comments

Comments
 (0)

[8]ページ先頭

©2009-2025 Movatter.jp