Ruby Rogues
Secrets Management Best Practices and Tools - RUBY 655
Charles Maxwood
And so then the encryption key is usually put into an environment variable or, you know, passed into the system that you're running it on on the other end in some way. And lately I've been doing my deployments with Kamal, which uses Docker. And so it kind of sets that all up when it sets up the container.
0
💬
0
Comments
Log in to comment.
There are no comments yet.