This depends on your application and needs, but....It should be worth noting that encrypted databags in this case arejust shifting the problem around.You still have to drop a secret on the node, out of band ofchef-client, to decrypt a secret.
There are examples of generating a secret where it belongs andexporting the public half via the node object. I know the Jenkinscookbook on the community site does this with SSH keys. Ohai exposeshost_dsa_public and host_rsa_public attributes by default in a nodeobject.
Check out the PKI cookbook for a (kinda ghetto) example of how to dothis with SSL certs.-s
On Wed, Jan 9, 2013 at 3:59 PM, Phil Mocek < "> > wrote:On Wed, Jan 09, 2013 at 05:40:25PM -0200, Cassiano Leal wrote:Is there a way to securely distribute private ssh keys throughthe users community cookbook?Yes.I saw that the users cookbook will use "ssh_private_key" and"ssh_public_key" data bag items, but those would be unencrypted,so not secure.That is not the case when you use [encrypted data bags][1].References:--Phil Mocek
Archive powered by MHonArc 2.6.16.