you -> doll
Some checks failed
ci/woodpecker/push/build-deploy Pipeline failed

This commit is contained in:
41666 2025-05-16 14:31:25 -07:00
parent a3099f2147
commit 993b35139d

View file

@ -5,7 +5,7 @@ description: how it stores secrets alongside its code
&soppy wet nix (16MAY2025) ^a
what if you read [code:/secrets/dont_leak] but it said [codeblock::
what if that one read [code:/secrets/dont_leak] but it said [codeblock::
dont_leak: ENC[AES256_GCM,data:psyelHNBMy+xglw=,iv:UhxfqAqVbCgMRMqRMA1MmvgIO18zTrVtQdFywupZyYA=,tag:Legj+njC3z8jX16n1pZszg==,type:str]
]
@ -16,7 +16,7 @@ description: how it stores secrets alongside its code
most of the time, handling these manually once somewhere, dropping it in a file somewhere on a
remote machine or UI and that's the end of it.
but what if you're like. the type of lazy that doing a lot of work now means not doing the work a second time?
but what if that one's like. the type of lazy that doing a lot of work now means not doing the work a second time?
[em:that's like this doll.]
lets talk about our bestie [em(b):[link(https://github.com/Mic92/sops-nix):sops-nix]]
@ -25,12 +25,12 @@ description: how it stores secrets alongside its code
sops-nix is based on [link(https://github.com/getsops/sops):sops], so unfortunately we need to start there.
[em(b):sops] is a way to automate encryption and decryption of secret data you might want tightly coupled to a use case.
[em(b):sops] is a way to automate encryption and decryption of secret data doll might want tightly coupled to a use case.
irl, one might pair this to AWS KMS or another type of distributed keystore; and that's cool. but. this isn't irl.
this is a video game, dolly.
instead we'll focus on sops's [link(https://github.com/FiloSottile/age):age] encryption method, which is based on ed25519 SSH keys you already use (right?)
instead we'll focus on sops's [link(https://github.com/FiloSottile/age):age] encryption method, which is based on ed25519 SSH keys doll already use (right?)
[quote::
it can hear those thoughts,
@ -117,7 +117,7 @@ description: how it stores secrets alongside its code
&how old is one's encryption
age answers that question by letting doll use ed25519 keys to encrypt and decrypt your data.
age answers that question by letting doll use ed25519 keys to encrypt and decrypt doll's data.
[quote:ed25519 would be a good name for a doll... ^n]