Skip to content

Commit 9eab589

Browse files
committed
improve English
1 parent f25c612 commit 9eab589

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

docs/secrets.md

+4-4
Original file line numberDiff line numberDiff line change
@@ -22,14 +22,14 @@ For most, this workflow is simply:
2222

2323
<a href="./templates#parameters">Template parameters</a> are a dangerous way to accept secrets.
2424
We show parameters in cleartext around the product. Assume anyone with view
25-
access to your workspace can also see parameters.
25+
access to a workspace can also see its parameters.
2626

2727
## Dynamic Secrets
2828

2929
Dynamic secrets are attached to the workspace lifecycle and require no setup by
3030
the end user.
3131

32-
They can be implemented in native Terraform like so:
32+
They can be implemented in your template code like so:
3333

3434
```hcl
3535
resource "twilio_iam_api_key" "api_key" {
@@ -40,7 +40,7 @@ resource "twilio_iam_api_key" "api_key" {
4040
resource "coder_agent" "dev" {
4141
# ...
4242
env = {
43-
# Let users access the secret via #TWILIO_API_SECRET
43+
# Let users access the secret via $TWILIO_API_SECRET
4444
TWILIO_API_SECRET = "${twilio_iam_api_key.api_key.secret}"
4545
}
4646
}
@@ -49,7 +49,7 @@ resource "coder_agent" "dev" {
4949
This method is limited to [services with Terraform providers](https://registry.terraform.io/browse/providers).
5050

5151
A catch-all variation of this approach is dynamically provisioning a cloud service account (e.g [GCP](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/google_service_account_key#private_key))
52-
for each workspace and then make the relevant secrets available via the cloud's secret management
52+
for each workspace and then making the relevant secrets available via the cloud's secret management
5353
system.
5454

5555
## Coder SSH Key

0 commit comments

Comments
 (0)