Skip to content

Instantly share code, notes, and snippets.

let
fontOverlay = import ./font-overlays.nix;
pkgsOverlay = import ./pkgs-overlay.nix;
user = "anhduy";
in
{ config, pkgs, ... }:
{
imports = [ <home-manager/nix-darwin> ];
type name default problem
Opt_WarnDuplicateExports duplicate-exports on
Opt_WarnOverflowedLiterals overflowed-literals on
Opt_WarnEmptyEnumerations empty-enumerations on
Opt_WarnMissingFields missing-fields on
Opt_WarnMissingMethods missing-methods on
Opt_WarnOverlappingPatterns overlapping-patterns on

Keybase proof

I hereby claim:

  • I am voanhduy1512 on github.
  • I am voanhduy1512 (https://keybase.io/voanhduy1512) on keybase.
  • I have a public key whose fingerprint is 0B4A 3FA2 0D79 A476 5395 44E1 876B 178E FF8D 2C28

To claim this, I am signing this object:

Lesson from part 1

Vault can protect us against:

  • Eavesdropping on any Vault communication
  • Tampering with data at rest or in transit
  • Access to data or controls without authentication or authorization
  • Access to data or controls without accountability
  • Confidentiality of stored secrets

Secret Management with Vault

Problems

  • Cloud deployment problem: Where do we store our secrets (read: database username and password) and how to give them to the server when we deploy?
  • Secret sharing and auditing problem: If everybody in our team know and share one token, how can we audit when something is wrong happend? Who is the last person login using the share key?
  • Revocation problem: our ex-sysadmin have quitted, do we remember to remove his