secrets-init | minimalistic init system for containers with AWS/GCP | AWS library
kandi X-RAY | secrets-init Summary
kandi X-RAY | secrets-init Summary
minimalistic init system for containers with AWS/GCP secrets support
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
- run executes a command in the main process
- main is the entrypoint command .
- copyCmd is a command to copy a file
- ResolveSecrets is the implementation of the SecretsProvider interface .
- removeZombies is used to remove any zombie processes from a child process
- mainCmd is the main command .
- NewAwsSecretsProvider returns a new AWS SecretsProvider
- NewGoogleSecretsProvider returns a new Google SecretProvider .
- IsJSON checks if the given string is a JSON message
secrets-init Key Features
secrets-init Examples and Code Snippets
Community Discussions
Trending Discussions on secrets-init
QUESTION
Ok.. so, we have Google Secret Manager on GCP, AWS Secret Manager in AWS, Key Vault in Azure... and so on.
Those services give you libs so you can code the way your software will access the secrets there. They all look straightforward and sort of easy to implement. Right?
For instance, using Google SM you can like:
...ANSWER
Answered 2021-Aug-04 at 21:39There are many possible motivations why you may want to use an abstraction (such as the CSI driver or sidecar injector) over a native integration:
Portability - If you're multi-cloud or multi-target, you may have multiple secret management solutions. Or you might have a different secret manager target for local development versus production. Projecting secrets onto a virtual filesystem or into environment variables provides a "least common denominator" approach that decouples the application from its secrets management provider.
Local development - Similar to the previous point on portability, it's common to have "fake" or fakeish data for local development. For local dev, secrets might all be fake and not need to connect to a real secret manager. Moving to an abstraction avoids error-prone spaghetti code like:
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install secrets-init
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page