All Projects → sorah → itamae-secrets

sorah / itamae-secrets

Licence: MIT License
Encrypted Data Bag for Itamae

Programming Languages

ruby
36898 projects - #4 most used programming language
shell
77523 projects

Projects that are alternatives of or similar to itamae-secrets

tailor
Infrastructure as Code for OpenShift
Stars: ✭ 12 (-83.78%)
Mutual labels:  infrastructure-as-code
solutions-terraform-jenkins-gitops
Demonstrates the use of Jenkins and Terraform to manage Infrastructure as Code using GitOps practices
Stars: ✭ 49 (-33.78%)
Mutual labels:  infrastructure-as-code
yor
Extensible auto-tagger for your IaC files. The ultimate way to link entities in the cloud back to the codified resource which created it.
Stars: ✭ 459 (+520.27%)
Mutual labels:  infrastructure-as-code
aws-cdk-go
AWS CDK bindings for Go.
Stars: ✭ 94 (+27.03%)
Mutual labels:  infrastructure-as-code
scale-network
SCaLE's on-site expo network configurations, wifi, tooling, and scripts
Stars: ✭ 13 (-82.43%)
Mutual labels:  infrastructure-as-code
resoto
Resoto - Find leaky resources, manage quota limits, detect drift, and clean up!
Stars: ✭ 562 (+659.46%)
Mutual labels:  infrastructure-as-code
sre
📚 Index for my study topics
Stars: ✭ 47 (-36.49%)
Mutual labels:  infrastructure-as-code
kondate
Kondate is yet another nodes management framework for Itamae/Serverspec
Stars: ✭ 56 (-24.32%)
Mutual labels:  itamae
restme
Template to bootstrap a fully functional, multi-region, REST service on GCP with a developer release pipeline.
Stars: ✭ 19 (-74.32%)
Mutual labels:  infrastructure-as-code
PSDocs
Generate documentation from Infrastructure as Code (IaC).
Stars: ✭ 75 (+1.35%)
Mutual labels:  infrastructure-as-code
c3
𝗖𝟯 provides compliant AWS CDK components to various security standards.
Stars: ✭ 24 (-67.57%)
Mutual labels:  infrastructure-as-code
Red-Baron
Automate creating resilient, disposable, secure and agile infrastructure for Red Teams
Stars: ✭ 326 (+340.54%)
Mutual labels:  infrastructure-as-code
ansible-infrastructure
Ansible-based infrastructure-as-code for hosting and deploying Magento-based shops
Stars: ✭ 19 (-74.32%)
Mutual labels:  infrastructure-as-code
chake
Simple configuration management with chef and rake. This repository is a mirror, the official one is at https://gitlab.com/terceiro/chake
Stars: ✭ 19 (-74.32%)
Mutual labels:  itamae
PSRule-pipelines
Validate infrastructure as code (IaC) and DevOps repositories using Azure Pipelines.
Stars: ✭ 16 (-78.38%)
Mutual labels:  infrastructure-as-code
gitlab-setup
A Packer / Terraform / Ansible configuration to install Gitlab and Gitlab-CI
Stars: ✭ 53 (-28.38%)
Mutual labels:  infrastructure-as-code
pytestlab
A pytest powered framework for multi-host integration and system testing
Stars: ✭ 17 (-77.03%)
Mutual labels:  infrastructure-as-code
kubecfg
A tool for managing complex enterprise Kubernetes environments as code.
Stars: ✭ 739 (+898.65%)
Mutual labels:  infrastructure-as-code
kubecfg
A tool for managing complex enterprise Kubernetes environments as code.
Stars: ✭ 35 (-52.7%)
Mutual labels:  infrastructure-as-code
terraform-provider-kubeadm
A Terraform provider/provisioner for deploying Kubernetes with kubeadm
Stars: ✭ 60 (-18.92%)
Mutual labels:  infrastructure-as-code

Itamae::Secrets - Encrypted Data Bag for Itamae

This is itamae plugin that provides store for secrets, like encrypted data bag in chef.

Installation

gem 'itamae-secrets'

or

$ gem install itamae-secrets

Basic

  • itamae-secrets command for storing data or manually reading
  • Itamae::Secrets interface for itamae recipes
  • Data are stored in base directory.
    • You must avoid ${base}/keys from checked into VCS. (.gitignore it!)

Walkthrough

Generate a key

randomly
$ itamae-secrets newkey --base=./secret --method=aes-random
from passphrase
$ itamae-secrets newkey --base=./secret --method=aes-passphrase

Both generates ./secret/keys/default. Make sure ./secret/keys be excluded from VCS.

Store value

$ itamae-secrets set --base=./secret awesome_secret value

(when omit value, it'll read from STDIN until EOF. You can also use --noecho if you want hide value in your terminal's buffer completely.)

Reading data from itamae

on your itamae recipe, do:

require 'itamae/secrets'
node[:secrets] = Itamae::Secrets(File.join(__dir__, 'secret'))

# Use it
p node[:secrets][:awesome_secret]

Reading data from CLI

$ itamae-secrets get --base=./secret awesome_secret

Remembering --base

$ echo 'base: ./secret' >> .itamae-secrets.yml

Development

After checking out the repo, run bin/setup to install dependencies. Then, run rake rspec to run the tests. You can also run bin/console for an interactive prompt that will allow you to experiment.

To install this gem onto your local machine, run bundle exec rake install. To release a new version, update the version number in version.rb, and then run bundle exec rake release, which will create a git tag for the version, push git commits and tags, and push the .gem file to rubygems.org.

Contributing

Bug reports and pull requests are welcome on GitHub at https://github.com/sorah/itamae-secrets.

Security issues? Send me directly at [email protected]. My GPG key is available here: http://sorah.jp/id.html (SSL)

License

The gem is available as open source under the terms of the MIT License.

To-dos

  • Missing test :(
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].