Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use Secrets Manager for JWT secret #140

Merged
merged 1 commit into from
Apr 2, 2024
Merged

Conversation

gregtyler
Copy link
Contributor

Rather than passing it in as an easily-leakable environment variable, use Secrets Manager to store the secret used for JWT key signing

For VEGA-2424 #minor

@gregtyler gregtyler requested a review from a team as a code owner March 27, 2024 10:44
@gregtyler gregtyler force-pushed the VEGA-2424-use-secretsmanager branch from e304cb2 to a9234ac Compare March 27, 2024 11:02
@gregtyler gregtyler force-pushed the VEGA-2424-use-secretsmanager branch from a9234ac to 9252e13 Compare March 27, 2024 11:04
@gregtyler gregtyler force-pushed the VEGA-2424-use-secretsmanager branch from 9252e13 to 6592a23 Compare March 27, 2024 12:17
@gregtyler gregtyler force-pushed the VEGA-2424-use-secretsmanager branch from 6592a23 to 721e046 Compare March 27, 2024 13:50
@gregtyler gregtyler force-pushed the VEGA-2424-use-secretsmanager branch 4 times, most recently from a206061 to 2e46b21 Compare March 27, 2024 14:22
@gregtyler gregtyler force-pushed the VEGA-2424-use-secretsmanager branch from 2e46b21 to 1754722 Compare March 27, 2024 14:45
Rather than passing it in as an easily-leakable environment variable, use Secrets Manager to store the secret used for JWT key signing

For VEGA-2424 #minor
@gregtyler gregtyler merged commit e71ccd1 into main Apr 2, 2024
22 checks passed
@gregtyler gregtyler deleted the VEGA-2424-use-secretsmanager branch April 2, 2024 11:20
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants