This commit is contained in:
parent
a3099f2147
commit
993b35139d
1 changed files with 5 additions and 5 deletions
|
@ -5,7 +5,7 @@ description: how it stores secrets alongside its code
|
|||
|
||||
&soppy wet nix (16MAY2025) ^a
|
||||
|
||||
what if you read [code:/secrets/dont_leak] but it said [codeblock::
|
||||
what if that one read [code:/secrets/dont_leak] but it said [codeblock::
|
||||
dont_leak: ENC[AES256_GCM,data:psyelHNBMy+xglw=,iv:UhxfqAqVbCgMRMqRMA1MmvgIO18zTrVtQdFywupZyYA=,tag:Legj+njC3z8jX16n1pZszg==,type:str]
|
||||
]
|
||||
|
||||
|
@ -16,7 +16,7 @@ description: how it stores secrets alongside its code
|
|||
most of the time, handling these manually once somewhere, dropping it in a file somewhere on a
|
||||
remote machine or UI and that's the end of it.
|
||||
|
||||
but what if you're like. the type of lazy that doing a lot of work now means not doing the work a second time?
|
||||
but what if that one's like. the type of lazy that doing a lot of work now means not doing the work a second time?
|
||||
[em:that's like this doll.]
|
||||
|
||||
lets talk about our bestie [em(b):[link(https://github.com/Mic92/sops-nix):sops-nix]]
|
||||
|
@ -25,12 +25,12 @@ description: how it stores secrets alongside its code
|
|||
|
||||
sops-nix is based on [link(https://github.com/getsops/sops):sops], so unfortunately we need to start there.
|
||||
|
||||
[em(b):sops] is a way to automate encryption and decryption of secret data you might want tightly coupled to a use case.
|
||||
[em(b):sops] is a way to automate encryption and decryption of secret data doll might want tightly coupled to a use case.
|
||||
|
||||
irl, one might pair this to AWS KMS or another type of distributed keystore; and that's cool. but. this isn't irl.
|
||||
this is a video game, dolly.
|
||||
|
||||
instead we'll focus on sops's [link(https://github.com/FiloSottile/age):age] encryption method, which is based on ed25519 SSH keys you already use (right?)
|
||||
instead we'll focus on sops's [link(https://github.com/FiloSottile/age):age] encryption method, which is based on ed25519 SSH keys doll already use (right?)
|
||||
|
||||
[quote::
|
||||
it can hear those thoughts,
|
||||
|
@ -117,7 +117,7 @@ description: how it stores secrets alongside its code
|
|||
|
||||
&how old is one's encryption
|
||||
|
||||
age answers that question by letting doll use ed25519 keys to encrypt and decrypt your data.
|
||||
age answers that question by letting doll use ed25519 keys to encrypt and decrypt doll's data.
|
||||
|
||||
[quote:ed25519 would be a good name for a doll... ^n]
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue