Persisting Secrets #16
Labels
No Label
Kind/Breaking
Kind/Bug
Kind/Documentation
Kind/Enhancement
Kind/Feature
Kind/Security
Kind/Spike
Kind/Testing
Priority
Critical
Priority
High
Priority
Low
Priority
Medium
Status
Abandoned
Status
Blocked
Status
Need More Info
No Milestone
No project
No Assignees
1 Participants
Notifications
Due Date
No due date set.
Depends on
#21 Secrets VM
cyclane/kovalhome
#25 Migrate Photos VM to read secrets from Infisical
cyclane/kovalhome
Reference: cyclane/kovalhome#16
Loading…
Reference in New Issue
No description provided.
Delete Branch "%!s(<nil>)"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
At the moment, secrets are stored locally in a file and persistence is broken if
[deploy-all]
is used. This is bad. Let's use a secrets server (or at least fix this method) instead.https://www.conjur.org/ seems promissing.
https://infisical.com/ is actually viable too, Ansible support came 3 months ago.
Conjur docs are plain weird, and it's less actively maintained. Let's go for infiscal.
cyclane referenced this issue2024-01-04 08:57:27 +00:00
cyclane referenced this issue2024-01-04 12:54:11 +00:00