Operations¶
The framework's "operations" section covers patterns that sit between the engineer's personal environment and the team's deployed services — secrets management, SSH identity and key management, credential rotation, and the disciplines that keep development-environment state consistent across machines and teams.
The two hardest concerns in this category are credentials (how they're stored, how they reach processes, how to keep them off disk) and identity (which SSH key, which git profile, which cloud credential reaches which system).
In this section¶
- Secrets — 1Password as the primary store, direnv
for project-scoped credential loading, the
op://reference pattern, and how this composes with Vault and sops. - SSH and Key Management — Ed25519 keys, the
~/.ssh/configreference, ssh-agent and 1Password agent, connection multiplexing, host aliases for multi-identity use, and ProxyJump.
The framework's stance on operations¶
Credentials live in vaults, not on disk. Every long-lived
credential (API tokens, database passwords, signing keys) belongs in
a credential store the engineer can audit and rotate. Files like
.env, .aws/credentials, and ~/.netrc are convenient but
fundamentally wrong — they put long-lived secrets in plaintext on
disk where backups, sync tools, and laptop theft can leak them.
Project-level configuration travels with the project. The
patterns that make a project work — its mise.toml, its
.envrc.template, its compose.yml, its devcontainer — should be
in the repo. Engineers cloning the repo should be able to get to a
working development environment from git clone plus a documented
setup command, with credentials as the only thing they need to
provide individually.
Reproducibility is the goal, but it's not the only goal. A fully-reproducible environment is also a slow one to set up if the machinery is heavy. The framework's patterns lean toward "good enough reproducibility" — the same tools at the same versions, the same shell configuration, the same project setup story — without chasing absolute purity (Nix-style hermetic builds, pinned compiler flags, etc.). For most teams, that level of purity isn't worth the operational cost.