chef / effortless

Automated best practices for Chef Infra and Chef InSpec
https://chef.io
Apache License 2.0
33 stars 38 forks source link

Support pulling token from secrets management for service overrides. #256

Open scottvidmar opened 3 years ago

scottvidmar commented 3 years ago

Describe the Enhancement:

I would like to store secrets related to Automate in a secure form. Today, I can override service values directly, build with the secret in, or put a user.toml down with my token in plain text.

I'd like a way to pull those secrets from a secure location like a secrets management solution.

Describe the Need:

Keeping secrets out of plain text on systems is pretty standard security best-practice. All users would benefit from being able to keep secrets out of source code, plain text in env variables, and not stored in plain text on disk.

Current Alternative

Right now, the best workaround I've found involves using the Habitat cookbook to pull the secret out of secrets management, and using that to put the Automate info into a user.toml file.