Menu
Sign In Pricing Add Podcast

Ruby Rogues

Secrets Management Best Practices and Tools - RUBY 655

166.154 - 186.088 Charles Maxwood

And so then the encryption key is usually put into an environment variable or, you know, passed into the system that you're running it on on the other end in some way. And lately I've been doing my deployments with Kamal, which uses Docker. And so it kind of sets that all up when it sets up the container.

0
💬 0

Comments

There are no comments yet.

Log in to comment.