Check out SOPS, we use it to commit encrypted secrets into Git and only
people with access to keys can see them.

https://github.com/mozilla/sops

On Sat, Oct 1, 2022 at 2:59 AM Peter Galbavy <pe...@wonderland.org> wrote:

> We have a different requirement, which is opaquing of credentials in user
> visible config files. The company I work for has a basic way of doing this
> in the "real" product and I followed the same model for compatibility.
> There is, as yet, no auto rotation.
>
> Basically, we generate an OpenSSL "compatible" key file and use that to
> encode and decode the credentials. The key file is still local but
> can/should be on a different file system and only readable by the app
> owner. The config files can then be edited / communicated with less chance
> of leaks. The objective is to protect against casual mistakes, not against
> determined actors.
>
> I layered it, along with other local requirements, over viper so that
> "GetString" etc. just works.
>
> https://github.com/ITRS-Group/cordial/tree/main/pkg/config
>
> Peter
>
>
> On Friday, 30 September 2022 at 17:34:29 UTC+1 Ivan Buljan wrote:
>
>> Hello World
>>
>> This relates to that never ending question of securing the credentials in
>> production/staging envs, that is, avoiding storing them as plain text
>>
>> I am wondering if anyone could share their thoughts about the following
>> approach we are thinking of taking.
>>
>> Here we go:
>>
>> During build phase, an encryption key is generated and credentials are
>> encrypted with it.
>>
>> Once deployed, the instance decrypts credentials with the provided key
>> and does what it needs with them. Just before destroying the original files
>> (creds & key), the instance then generates a new encryption key and
>> re-encrypts a copy of credentials, which it keeps in memory. Newly
>> encrypted credentials along with the key are only dumped onto a filesystem
>> if the application panics and requires to be restarted, at which point the
>> same cycle key rotation decryption/encryption happens again.
>>
>> Is any security benefit with such approach?
>>
>>
>> --
> You received this message because you are subscribed to the Google Groups
> "golang-nuts" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to golang-nuts+unsubscr...@googlegroups.com.
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/golang-nuts/d011891f-ab3f-41eb-8ad1-c90cbcf78a58n%40googlegroups.com
> <https://groups.google.com/d/msgid/golang-nuts/d011891f-ab3f-41eb-8ad1-c90cbcf78a58n%40googlegroups.com?utm_medium=email&utm_source=footer>
> .
>

-- 
You received this message because you are subscribed to the Google Groups 
"golang-nuts" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to golang-nuts+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/golang-nuts/CA%2Bv29LtbJbScc1EeDa0QbOm48wVa_sXxitAR%3Dy-Wki9BekV%3DiA%40mail.gmail.com.

Reply via email to