|
You are here |
frederic-hemberger.de | ||
| | | | |
www.skitoy.com
|
|
| | | | | The classic problem in cloud engineering is that you have a bunch of API keys, secrets and passwords you need to have available to your code but not available ... | |
| | | | |
www.pulumi.com
|
|
| | | | | Learn how to manage Kubernetes secrets with Pulumi ESC and External Secrets Operator | |
| | | | |
nsirap.com
|
|
| | | | | Give access rights on a Kubernetes to the Google Cloud Container Registry. Pull private container to the Container Registry. | |
| | | | |
awsteele.com
|
|
| | | Back in 2021, I requested that AWS add some kind of claim-to-tag mapping functionality to OIDC IDPs, so that we could have role session tags based on claims in OIDC tokens issued by GitHub Actions. That hasnt happened yet, but today I learned (thanks to this comment and associated blog post by Daniel Jonsén) that the same outcome can be achieved by using AWS Cognito identity pools as an intermediary. | ||