summaryrefslogtreecommitdiff
path: root/RELEASE_NOTES.md
diff options
context:
space:
mode:
authorTim Smith <tsmith@chef.io>2021-07-21 13:24:37 -0700
committerTim Smith <tsmith@chef.io>2021-07-21 13:24:37 -0700
commite4edd329b037e68edc07062664725d3a517535f8 (patch)
treebef7481a2ccaaa2b985296519763e194c5037496 /RELEASE_NOTES.md
parentcc5b6935c1472c44e82f8823598b4dc7a43f5e9d (diff)
downloadchef-e4edd329b037e68edc07062664725d3a517535f8.tar.gz
Update the secrets docs
Signed-off-by: Tim Smith <tsmith@chef.io>
Diffstat (limited to 'RELEASE_NOTES.md')
-rw-r--r--RELEASE_NOTES.md6
1 files changed, 3 insertions, 3 deletions
diff --git a/RELEASE_NOTES.md b/RELEASE_NOTES.md
index b68f44e74a..14ed69ce80 100644
--- a/RELEASE_NOTES.md
+++ b/RELEASE_NOTES.md
@@ -221,7 +221,7 @@ end
### Experimental Secrets Management
-With Chef Infra Client 17.3, we're introducing experimental secrets management integration with a new `secrets` helper in the Infra Language. This helper has a pluggable model for fetching secrets from different secrets management systems. In this release of Chef Infra Client we're support AWS Secrets Manager and Azure Key Vault with additional secrets managers coming in future releases. This new functionality should be considered a beta and not not necessarily ready for production usage. We'd love to get feedback on how how this works for you and additional features you'd like, or need, in order to utilize secrets from secret managers within your cookbooks. E-mail us at secrets_management_beta@progress.com.
+With Chef Infra Client 17.3, we're introducing experimental secrets management integration with a new `secrets` helper in the Infra Language. This helper has a pluggable model for fetching secrets from multiple secrets management systems. In this release of Chef Infra Client we're support AWS Secrets Manager and Azure Key Vault with additional secrets managers coming in future releases. This new functionality should be considered a beta and not not necessarily ready for production usage. We'd love to get feedback on how how this works for you and additional features you'd like, or need, in order to utilize secrets from secret managers within your cookbooks. E-mail us at secrets_management_beta@progress.com.
#### Authentication
@@ -237,7 +237,7 @@ The secrets helper accepts the secret name, and secrets service, secret version
secret(name: 'test1', service: :aws_secrets_manager)
```
-##### Fetching a AWS Secrets Manager secret from another region
+##### Fetching an AWS Secrets Manager secret from another region
```ruby
secret(name: 'test1', service: :aws_secrets_manager, config: { region: 'us-west-2' })
@@ -257,7 +257,7 @@ secret(name: 'test1', version: 'v1', service: :azure_key_vault, config: { vault:
#### Using in Cookbooks
-The secrets helper returns a text string, so it can be used anywhere in Chef Infra that you'd hard code a value or access a value a data bag.
+The secrets helper returns a text string, so it can be used anywhere in Chef Infra where you might hard code a value or access a value from a data bag.
##### Writing a Secret To a File