Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commitd509029

Browse files
committed
improve english moar
1 parent9eab589 commitd509029

File tree

1 file changed

+12
-9
lines changed

1 file changed

+12
-9
lines changed

‎docs/secrets.md‎

Lines changed: 12 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -5,31 +5,36 @@ This article explains how to use secrets in a workspace. To authenticate the
55
workspace provisioner, see <ahref="./templates/authentication">this</a>.
66
</blockquote>
77

8-
Codertakes an unopinionated stance to workspacesecrets.
8+
Coderis open-minded about how you get yoursecrets into your workspaces.
99

1010
##Wait a minute...
1111

1212
Your first stab at secrets with Coder should be your local method.
1313
You can do everything you can locally and more with your Coder workspace, so
14-
whatever workflow and tools you already use to manage secretscan be brought
14+
whatever workflow and tools you already use to manage secretsmay be brought
1515
over.
1616

1717
For most, this workflow is simply:
1818

1919
1. Give your users their secrets in advance
20-
1.They write them to a persistent file after
21-
they've builta workspace
20+
1.Your users write them to a persistent file after
21+
they've builttheir workspace
2222

2323
<ahref="./templates#parameters">Template parameters</a> are a dangerous way to accept secrets.
2424
We show parameters in cleartext around the product. Assume anyone with view
2525
access to a workspace can also see its parameters.
2626

2727
##Dynamic Secrets
2828

29-
Dynamic secrets are attached to the workspace lifecycle and require no setup by
30-
the end user.
29+
Dynamic secrets are attached to the workspace lifecycle and automatically
30+
injected into the workspace. For a little bit of up front template work,
31+
they make life simpler for both the end user and the security team.
3132

32-
They can be implemented in your template code like so:
33+
This method is limited to
34+
[services with Terraform providers](https://registry.terraform.io/browse/providers),
35+
which excludes obscure API providers.
36+
37+
Dynamic secrets can be implemented in your template code like so:
3338

3439
```hcl
3540
resource "twilio_iam_api_key" "api_key" {
@@ -46,8 +51,6 @@ resource "coder_agent" "dev" {
4651
}
4752
```
4853

49-
This method is limited to[services with Terraform providers](https://registry.terraform.io/browse/providers).
50-
5154
A catch-all variation of this approach is dynamically provisioning a cloud service account (e.g[GCP](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/google_service_account_key#private_key))
5255
for each workspace and then making the relevant secrets available via the cloud's secret management
5356
system.

0 commit comments

Comments
 (0)

[8]ページ先頭

©2009-2025 Movatter.jp