Skip to content

Commit d509029

Browse files
committed
improve english moar
1 parent 9eab589 commit d509029

File tree

1 file changed

+12
-9
lines changed

1 file changed

+12
-9
lines changed

docs/secrets.md

Lines changed: 12 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -5,31 +5,36 @@ This article explains how to use secrets in a workspace. To authenticate the
55
workspace provisioner, see <a href="./templates/authentication">this</a>.
66
</blockquote>
77

8-
Coder takes an unopinionated stance to workspace secrets.
8+
Coder is open-minded about how you get your secrets into your workspaces.
99

1010
## Wait a minute...
1111

1212
Your first stab at secrets with Coder should be your local method.
1313
You can do everything you can locally and more with your Coder workspace, so
14-
whatever workflow and tools you already use to manage secrets can be brought
14+
whatever workflow and tools you already use to manage secrets may be brought
1515
over.
1616

1717
For most, this workflow is simply:
1818

1919
1. Give your users their secrets in advance
20-
1. They write them to a persistent file after
21-
they've built a workspace
20+
1. Your users write them to a persistent file after
21+
they've built their workspace
2222

2323
<a href="./templates#parameters">Template parameters</a> are a dangerous way to accept secrets.
2424
We show parameters in cleartext around the product. Assume anyone with view
2525
access to a workspace can also see its parameters.
2626

2727
## Dynamic Secrets
2828

29-
Dynamic secrets are attached to the workspace lifecycle and require no setup by
30-
the end user.
29+
Dynamic secrets are attached to the workspace lifecycle and automatically
30+
injected into the workspace. For a little bit of up front template work,
31+
they make life simpler for both the end user and the security team.
3132

32-
They can be implemented in your template code like so:
33+
This method is limited to
34+
[services with Terraform providers](https://registry.terraform.io/browse/providers),
35+
which excludes obscure API providers.
36+
37+
Dynamic secrets can be implemented in your template code like so:
3338

3439
```hcl
3540
resource "twilio_iam_api_key" "api_key" {
@@ -46,8 +51,6 @@ resource "coder_agent" "dev" {
4651
}
4752
```
4853

49-
This method is limited to [services with Terraform providers](https://registry.terraform.io/browse/providers).
50-
5154
A catch-all variation of this approach is dynamically provisioning a cloud service account (e.g [GCP](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/google_service_account_key#private_key))
5255
for each workspace and then making the relevant secrets available via the cloud's secret management
5356
system.

0 commit comments

Comments
 (0)
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy