Explore >> Select a destination


You are here

frederic-hemberger.de
| | www.skitoy.com
8.5 parsecs away

Travel
| | The classic problem in cloud engineering is that you have a bunch of API keys, secrets and passwords you need to have available to your code but not available ...
| | www.pulumi.com
10.9 parsecs away

Travel
| | Learn how to manage Kubernetes secrets with Pulumi ESC and External Secrets Operator
| | nsirap.com
9.6 parsecs away

Travel
| | Give access rights on a Kubernetes to the Google Cloud Container Registry. Pull private container to the Container Registry.
| | awsteele.com
61.8 parsecs away

Travel
| Back in 2021, I requested that AWS add some kind of claim-to-tag mapping functionality to OIDC IDPs, so that we could have role session tags based on claims in OIDC tokens issued by GitHub Actions. That hasnt happened yet, but today I learned (thanks to this comment and associated blog post by Daniel Jonsén) that the same outcome can be achieved by using AWS Cognito identity pools as an intermediary.