Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

allow to hide aws keys from kitchen.yml #50

Closed
JigarJoshi opened this issue May 14, 2014 · 3 comments
Closed

allow to hide aws keys from kitchen.yml #50

JigarJoshi opened this issue May 14, 2014 · 3 comments

Comments

@JigarJoshi
Copy link
Contributor

it allows to read it from environment variable, it would be nice if it allows to read it from encrypted databags, or some form of encrypted version

@JigarJoshi
Copy link
Contributor Author

Thanks @mmercer-appneta I thought to do it as well, but it would be nice if it has ability to store encrypted version of keys as part of cookbook and it has ability to decrypt it and use it

@cheeseprocedure
Copy link

Sorry about that - had a low blood-sugar moment and missed your mention of env vars :(

@sethvargo
Copy link
Contributor

@JigarJoshi since Test Kitchen is attempting to become less Chef-specific, it is unlikely we will support reading from data bags or the like. Test Kitchen does not even require you have Chef installed on your local system to provision remote instances - Chef is installed at boot time.

Environment variables are the easiest and most flexible solution. This is also in line with how similar tools operate (include Amazon's own Ruby SKD).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants