Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

how to store secrets outside of .dotfiles? #51

Open
jesperronn opened this issue Sep 28, 2015 · 3 comments
Open

how to store secrets outside of .dotfiles? #51

jesperronn opened this issue Sep 28, 2015 · 3 comments

Comments

@jesperronn
Copy link

Maybe I am missing the obvious. but where do I store secret keys for AWS, Heroku, etc and still have them loaded via dotfiles?

What would be my prefered way of doing that?

@Brzhk
Copy link

Brzhk commented Sep 29, 2015

Hey there,
The simplest solution would be to leave theses secret-containing files on a different medium you can trust - maybe a simple USB Key would be enough for you. However, if you want to store theses files publicly and still be able to hide your secret, i suggest looking into theses:

The Ansible way is, by far, my favorite solution so far. It's an amazing tool you will probably find useful one way or another, and is, in my opinion, worth looking into.
If you need a more custom/complex solution, you can maybe build a custom system on top of other kind of products... maybe hashicorp vault?

@gMagicScott
Copy link

I've been using LastPass for that since they now have a CLI tool.

export SAAS_SECRET=`lpass show sass_seceret --password`

@strong-code
Copy link

strong-code commented Sep 9, 2016

Used @gMagicScott suggestion and it worked perfectly as I required tokens in some commands.

Example:

curl -F file=@'foo.txt' -F uuid=$(lpass show --notes uuid_token) http://myhost.com

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants