Hi Maven User,
On Fri, Oct 21, 2011 at 4:01 PM, Maven User email@example.com wrote:
Ok, maybe this is again overkill, but I got it working like this:
passwords = Chef::EncryptedDataBagItem.load(“prod”, “passwords”,secret)
That works just fine.
Thoughts? This seems pretty wonky…
The current design is that EncryptedDataBagItem.load takes the
encryption secret itself, not a path to a file. If an encryption
secret is not specified, one is loaded via
The thinking was to keep the storage of the secret decoupled from the
function to load/decrypt. I can see that taking a path instead of the
secret might increase convenience. The downside is it would prevent
one from obtaining the secret in other ways.
The secret is sensitive to trailing new lines and other whitespace.
EncryptedDataBagItem.load_secret is doing two things for you: (1)
calling IO.read(path).strip which takes care of the trailing newline,
and (2) inspecting the specified path and loading data from a URL if
that is what was specified.
So Matthew’s suggestion to use IO.read just needed an extra .strip:
secret = IO.read(“C:/chef/secret”).strip
On Fri, Oct 21, 2011 at 5:36 PM, Maven User firstname.lastname@example.org
Well, that worked, but I’m not sure I’m really jazzed by that solution.
I was able to update my client.rb file to point to the exact file the
secret was in and it worked.
But, what if different cookbooks have different secret files?
I can imagine wanting to use more than one encrypted data bag item
each with its own secret on the same node. To achieve that with the
current code you will need to use two steps to load as you’ve done.
I think it would be better to keep cookbooks decoupled from secrets. A
recipe might require one or more encrypted data bag items, but ideally
the secret used is data driven so that dev, preprod, and prod can all
use the same cookbook with different shared secrets.
I’d be interested to hear more details on how you and others are using
encrypted data bag items with a focus on what the encryption is
Seth Falcon | Development Lead | Opscode | @sfalcon