Skip to content

Commit ae1896f

Browse files
authored
chore(docs): replace numbering with bullets in admin/encryption.md (coder#9792)
1 parent 8e012e4 commit ae1896f

File tree

1 file changed

+57
-57
lines changed

1 file changed

+57
-57
lines changed

docs/admin/encryption.md

Lines changed: 57 additions & 57 deletions
Original file line numberDiff line numberDiff line change
@@ -42,26 +42,26 @@ Additional database fields may be encrypted in the future.
4242
4343
## Enabling encryption
4444

45-
1. Ensure you have a valid backup of your database. **Do not skip this step.**
46-
If you are using the built-in PostgreSQL database, you can run
47-
[`coder server postgres-builtin-url`](../cli/server_postgres-builtin-url.md)
48-
to get the connection URL.
45+
- Ensure you have a valid backup of your database. **Do not skip this step.** If
46+
you are using the built-in PostgreSQL database, you can run
47+
[`coder server postgres-builtin-url`](../cli/server_postgres-builtin-url.md)
48+
to get the connection URL.
4949

50-
1. Generate a 32-byte random key and base64-encode it. For example:
50+
- Generate a 32-byte random key and base64-encode it. For example:
5151

5252
```shell
5353
dd if=/dev/urandom bs=32 count=1 | base64
5454
```
5555

56-
1. Store this key in a secure location (for example, a Kubernetes secret):
56+
- Store this key in a secure location (for example, a Kubernetes secret):
5757

5858
```shell
5959
kubectl create secret generic coder-external-token-encryption-keys --from-literal=keys=<key>
6060
```
6161

62-
1. In your Coder configuration set `CODER_EXTERNAL_TOKEN_ENCRYPTION_KEYS` to a
63-
comma-separated list of base64-encoded keys. For example, in your Helm
64-
`values.yaml`:
62+
- In your Coder configuration set `CODER_EXTERNAL_TOKEN_ENCRYPTION_KEYS` to a
63+
comma-separated list of base64-encoded keys. For example, in your Helm
64+
`values.yaml`:
6565

6666
```yaml
6767
coder:
@@ -74,22 +74,22 @@ coder:
7474
key: keys
7575
```
7676
77-
1. Restart the Coder server. The server will now encrypt all new data with the
78-
provided key.
77+
- Restart the Coder server. The server will now encrypt all new data with the
78+
provided key.
7979
8080
## Rotating keys
8181
8282
We recommend only having one active encryption key at a time normally. However,
8383
if you need to rotate keys, you can perform the following procedure:
8484
85-
1. Ensure you have a valid backup of your database. **Do not skip this step.**
85+
- Ensure you have a valid backup of your database. **Do not skip this step.**
8686
87-
1. Generate a new encryption key following the same procedure as above.
87+
- Generate a new encryption key following the same procedure as above.
8888
89-
1. Add the above key to the list of
90-
[external token encryption keys](../cli/server.md#--external-token-encryption-keys).
91-
**The new key must appear first in the list**. For example, in the Kubernetes
92-
secret created above:
89+
- Add the above key to the list of
90+
[external token encryption keys](../cli/server.md#--external-token-encryption-keys).
91+
**The new key must appear first in the list**. For example, in the Kubernetes
92+
secret created above:
9393
9494
```yaml
9595
apiVersion: v1
@@ -102,70 +102,70 @@ data:
102102
keys: <new-key>,<old-key1>,<old-key2>,...
103103
```
104104
105-
1. After updating the configuration, restart the Coder server. The server will
106-
now encrypt all new data with the new key, but will be able to decrypt tokens
107-
encrypted with the old key(s).
105+
- After updating the configuration, restart the Coder server. The server will
106+
now encrypt all new data with the new key, but will be able to decrypt tokens
107+
encrypted with the old key(s).
108108
109-
1. To re-encrypt all encrypted database fields with the new key, run
110-
[`coder server dbcrypt rotate`](../cli/server_dbcrypt_rotate.md). This
111-
command will re-encrypt all tokens with the specified new encryption key. We
112-
recommend performing this action during a maintenance window.
109+
- To re-encrypt all encrypted database fields with the new key, run
110+
[`coder server dbcrypt rotate`](../cli/server_dbcrypt_rotate.md). This command
111+
will re-encrypt all tokens with the specified new encryption key. We recommend
112+
performing this action during a maintenance window.
113113

114-
> Note: this command requires direct access to the database. If you are using
115-
> the built-in PostgreSQL database, you can run
116-
> [`coder server postgres-builtin-url`](../cli/server_postgres-builtin-url.md)
117-
> to get the connection URL.
114+
> Note: this command requires direct access to the database. If you are using
115+
> the built-in PostgreSQL database, you can run
116+
> [`coder server postgres-builtin-url`](../cli/server_postgres-builtin-url.md)
117+
> to get the connection URL.
118118

119-
1. Once the above command completes successfully, remove the old encryption key
120-
from Coder's configuration and restart Coder once more. You can now safely
121-
delete the old key from your secret store.
119+
- Once the above command completes successfully, remove the old encryption key
120+
from Coder's configuration and restart Coder once more. You can now safely
121+
delete the old key from your secret store.
122122

123123
## Disabling encryption
124124

125125
To disable encryption, perform the following actions:
126126

127-
1. Ensure you have a valid backup of your database. **Do not skip this step.**
127+
- Ensure you have a valid backup of your database. **Do not skip this step.**
128128

129-
1. Stop all active coderd instances. This will prevent new encrypted data from
130-
being written, which may cause the next step to fail.
129+
- Stop all active coderd instances. This will prevent new encrypted data from
130+
being written, which may cause the next step to fail.
131131

132-
1. Run [`coder server dbcrypt decrypt`](../cli/server_dbcrypt_decrypt.md). This
133-
command will decrypt all encrypted user tokens and revoke all active
134-
encryption keys.
132+
- Run [`coder server dbcrypt decrypt`](../cli/server_dbcrypt_decrypt.md). This
133+
command will decrypt all encrypted user tokens and revoke all active
134+
encryption keys.
135135

136-
> Note: for `decrypt` command, the equivalent environment variable for
137-
> `--keys` is `CODER_EXTERNAL_TOKEN_ENCRYPTION_DECRYPT_KEYS` and not
138-
> `CODER_EXTERNAL_TOKEN_ENCRYPTION_KEYS`. This is explicitly named
139-
> differently to help prevent accidentally decrypting data.
136+
> Note: for `decrypt` command, the equivalent environment variable for
137+
> `--keys` is `CODER_EXTERNAL_TOKEN_ENCRYPTION_DECRYPT_KEYS` and not
138+
> `CODER_EXTERNAL_TOKEN_ENCRYPTION_KEYS`. This is explicitly named differently
139+
> to help prevent accidentally decrypting data.
140140

141-
1. Remove all
142-
[external token encryption keys](../cli/server.md#--external-token-encryption-keys)
143-
from Coder's configuration.
141+
- Remove all
142+
[external token encryption keys](../cli/server.md#--external-token-encryption-keys)
143+
from Coder's configuration.
144144

145-
1. Start coderd. You can now safely delete the encryption keys from your secret
146-
store.
145+
- Start coderd. You can now safely delete the encryption keys from your secret
146+
store.
147147

148148
## Deleting Encrypted Data
149149

150150
> NOTE: This is a destructive operation.
151151

152152
To delete all encrypted data from your database, perform the following actions:
153153

154-
1. Ensure you have a valid backup of your database. **Do not skip this step.**
154+
- Ensure you have a valid backup of your database. **Do not skip this step.**
155155

156-
1. Stop all active coderd instances. This will prevent new encrypted data from
157-
being written.
156+
- Stop all active coderd instances. This will prevent new encrypted data from
157+
being written.
158158

159-
1. Run [`coder server dbcrypt delete`](../cli/server_dbcrypt_delete.md). This
160-
command will delete all encrypted user tokens and revoke all active
161-
encryption keys.
159+
- Run [`coder server dbcrypt delete`](../cli/server_dbcrypt_delete.md). This
160+
command will delete all encrypted user tokens and revoke all active encryption
161+
keys.
162162

163-
1. Remove all
164-
[external token encryption keys](../cli/server.md#--external-token-encryption-keys)
165-
from Coder's configuration.
163+
- Remove all
164+
[external token encryption keys](../cli/server.md#--external-token-encryption-keys)
165+
from Coder's configuration.
166166

167-
1. Start coderd. You can now safely delete the encryption keys from your secret
168-
store.
167+
- Start coderd. You can now safely delete the encryption keys from your secret
168+
store.
169169

170170
## Troubleshooting
171171

0 commit comments

Comments
 (0)