You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Kurtosis allows users to store secrets as strings within the Kurtosis engine
Secrets are stored securely, without risk of leaking (both locally, and more importantly in the Cloud)
Secrets are persistent through engine restarts
Users can reference secrets at any point by slotting in a future reference. At runtime, Kurtosis will replace the future reference with the actual secret value in a secure way (by communicating securely to the secrets manager)
@lostbean and I spec'd out a way to do Step 4 by injecting a wrapper binary into every secret-consuming user container that will securely pull the secret value at runtime. This has the extra benefit of the secret not even being revealed upon docker container inspect.
How important is this to you?
Painful; the lack of this feature makes using Kurtosis frictionful.
What area of the product does this pertain to?
CLI: the Command Line Interface
The text was updated successfully, but these errors were encountered:
Background & motivation
This has been needed several times:
Desired behaviour
@lostbean and I spec'd out a way to do Step 4 by injecting a wrapper binary into every secret-consuming user container that will securely pull the secret value at runtime. This has the extra benefit of the secret not even being revealed upon
docker container inspect
.How important is this to you?
Painful; the lack of this feature makes using Kurtosis frictionful.
What area of the product does this pertain to?
CLI: the Command Line Interface
The text was updated successfully, but these errors were encountered: