You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -225,11 +226,12 @@ will show you all the available facts you can query.
225
226
226
227
Depending on your role you can access the different manuals.
227
228
229
+
228
230
-[Requester manual](docs/requester-role.md). A test-run requester is the regular user of the system. They can register users and roles, and request test-runs.
229
231
-[Agent manual](docs/antithesis-agent-role.md). This is a special role that holds the key to the Antithesis platform. It is responsible for
230
232
whitelisting repository and managing test-runs, from pending state to running and completed.
231
233
-[Oracle manual](docs/oracle-role.md). The oracle is the owner of the Antithesis token. It is almost mechanically responsible for merging change requests from the agent and the requester.
232
-
234
+
-[Secrets management manual](docs/secrets-management.md). This manual describes how to manage secrets in a secure way.
233
235
Finally, the [Real-world scenario manual][realWorld] provides a realistic overall use case involving all three roles.
When passing secrets to a docker container in a compose you can use the `ANTI_SECRETS_FILE` environment variable to point to a file containing the secrets in yaml format. So instead of setting say `ANTI_SSH_PASSWORD` and `ANTI_GITHUB_PAT` you can create a file `secrets.yaml` with the following content:
6
+
7
+
```yaml
8
+
sshPassword: your_ssh_password
9
+
githubPAT: your_github_pat
10
+
```
11
+
12
+
and then pass it to the container with someething like:
13
+
14
+
```yaml
15
+
services:
16
+
anti:
17
+
.....
18
+
environment:
19
+
- ANTI_SECRETS_FILE=/run/secrets/anti_secrets
20
+
secrets:
21
+
- anti_secrets
22
+
23
+
secrets:
24
+
anti_secrets:
25
+
file: ./secrets.yaml
26
+
```
27
+
28
+
These are the supported secrets for different commands:
0 commit comments