Skip to content

Commit d509029

Browse files
committed
improve english moar
1 parent 9eab589 commit d509029

File tree

1 file changed

+12
-9
lines changed

1 file changed

+12
-9
lines changed

docs/secrets.md

+12-9
Original file line numberDiff line numberDiff line change
@@ -5,31 +5,36 @@ This article explains how to use secrets in a workspace. To authenticate the
55
workspace provisioner, see <a href="./templates/authentication">this</a>.
66
</blockquote>
77

8-
Coder takes an unopinionated stance to workspace secrets.
8+
Coder is open-minded about how you get your secrets into your workspaces.
99

1010
## Wait a minute...
1111

1212
Your first stab at secrets with Coder should be your local method.
1313
You can do everything you can locally and more with your Coder workspace, so
14-
whatever workflow and tools you already use to manage secrets can be brought
14+
whatever workflow and tools you already use to manage secrets may be brought
1515
over.
1616

1717
For most, this workflow is simply:
1818

1919
1. Give your users their secrets in advance
20-
1. They write them to a persistent file after
21-
they've built a workspace
20+
1. Your users write them to a persistent file after
21+
they've built their workspace
2222

2323
<a href="./templates#parameters">Template parameters</a> are a dangerous way to accept secrets.
2424
We show parameters in cleartext around the product. Assume anyone with view
2525
access to a workspace can also see its parameters.
2626

2727
## Dynamic Secrets
2828

29-
Dynamic secrets are attached to the workspace lifecycle and require no setup by
30-
the end user.
29+
Dynamic secrets are attached to the workspace lifecycle and automatically
30+
injected into the workspace. For a little bit of up front template work,
31+
they make life simpler for both the end user and the security team.
3132

32-
They can be implemented in your template code like so:
33+
This method is limited to
34+
[services with Terraform providers](https://registry.terraform.io/browse/providers),
35+
which excludes obscure API providers.
36+
37+
Dynamic secrets can be implemented in your template code like so:
3338

3439
```hcl
3540
resource "twilio_iam_api_key" "api_key" {
@@ -46,8 +51,6 @@ resource "coder_agent" "dev" {
4651
}
4752
```
4853

49-
This method is limited to [services with Terraform providers](https://registry.terraform.io/browse/providers).
50-
5154
A catch-all variation of this approach is dynamically provisioning a cloud service account (e.g [GCP](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/google_service_account_key#private_key))
5255
for each workspace and then making the relevant secrets available via the cloud's secret management
5356
system.

0 commit comments

Comments
 (0)