Open mumoshu opened 6 years ago
vaulted does this very smartly :)
$ vaulted add foo
Vault: foo
Variables:
[Empty]
AWS Key:
[Empty]
SSH Keys:
[Empty]
Environment:
Duration: 1h
Edit vault: [a,s,v,d,?,q]: v
Variables:
[Empty]
Edit environment variables: [a,D,?,b,q]: a
Name: FOO
Value: BAR
Variables:
FOO: BAR
This is much better than pre-creating a yaml file containing envvars because then you have no chance to expose the envvars before encryption!
sopsed add -n myvault env FOO
would be ncier as it doesn't force you to predefine plain-text envvars inside a yaml file input to this tool. Also see #5 for overall user experience of this tool involving this envvar management.
Like
vaulted shell
andvaulted env
respectively.Would it be feasible if I introduce a
.sopsed/<vault name>.yaml
like:which is encrypted/decrypted by
sops
and consumed bysopsed run bash
orsopsed env
respectively?