Store & manage secrets like API keys in Python - Tech Tip Tuesdays

Поделиться
HTML-код
  • Опубликовано: 29 сен 2024

Комментарии • 18

  • @chrisseary3504
    @chrisseary3504 Год назад +15

    You need to protect those secrets, and that isn't covered here. Encryption should be applied to the file contents, and restrictive ACLs should be applied to the file itself.

    • @robertcenusa8636
      @robertcenusa8636 3 месяца назад +1

      Could you recommend a tutorial that covers that part?

  • @mrs.neerajsharma7997
    @mrs.neerajsharma7997 8 месяцев назад

    Thank you so much , u r awesome

    • @GitGuardian
      @GitGuardian  8 месяцев назад

      Thanks for the feedback!!!

  • @mohammediftekharsalam8255
    @mohammediftekharsalam8255 2 месяца назад

    Bro I am seeing this video on a Tuesday coincidentally

  • @SkielCast
    @SkielCast Год назад +3

    Some observations:
    - The value of __name__ should not be use to determine environments
    - To choose between environments, an additional environment variable called "environment" could be used, with a default value of "dev" to avoid errors
    - Having multiple .envs in local could make sense but only as an edge case, production credentials should not be in ANY local machine
    - If Python-dotenv is going to be a dependency, considered using tools like PDM, Poetry or Pipenv to make sure dependencies are locked

  • @mycinemax2653
    @mycinemax2653 Год назад +2

    if i put .env or separate file to save secrets in my working server, how I protect it from outside hacker?

    • @zen.ali238
      @zen.ali238 5 месяцев назад

      did you find the answer?

  • @andrewschneider5722
    @andrewschneider5722 10 месяцев назад +1

    So if the secrets aren't in git, how can other collaborators use the secrets if they pick up a story that uses this code or how do testers test this code if they can't access the secrets?

    • @linux_fr
      @linux_fr 7 месяцев назад

      Secret Manager

  • @DanwandN.S
    @DanwandN.S Год назад +1

    Uhm how to put them in a prod server, the secrets should not be in the server right

    • @GitGuardian
      @GitGuardian  Год назад +1

      Each production environment is different but they will all have the ability to inject the secrets as environment variables which will be stored in local memory that can't be obtained by a malicious user.

  • @infossil
    @infossil 5 месяцев назад +1

    thank you, excellent

  • @shubhamtarkar38
    @shubhamtarkar38 Год назад

    Hi can you make a tutorial on implementing Ci-Cd with bitbucket and ggshield

  • @ElenaBiriuchevskaia
    @ElenaBiriuchevskaia 5 месяцев назад

    Thank you! Very well explained!

  • @lxvi4322
    @lxvi4322 5 месяцев назад

    how can I use this inside Aws Services like ERM-Studio? tnx

    • @GitGuardian
      @GitGuardian  5 месяцев назад

      You might want to try using AWS secrets manager for AWS native environments ruclips.net/video/as4gWjQYrHc/видео.htmlsi=v8-fL7fkpw3lJQGE

  • @hughesadam87
    @hughesadam87 Год назад

    Where does keyring fit into all this?