You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Today, if we want to pass variables to Dynamic Secret Files, we have to hard-code the secret in the model. This can lead to some secrets being pushed to Github, for example.
A simple feature is to allow env variables to pass the secret to Dynamic Secret Files. Until such time as it is directly possible to retrieve secrets via third-party solutions.
Describe the use case of the feature
Handle env variables in dynamic variables field :
Example:
A secret file is meant to stay "secret". This means it should be written directly in the file and make sure it doesn't end up in your commits - just throw it in .gitignore. It is your responsibility to handle and protect it.
I'd prefer if the secret file could work with encrypted values, like using sops.
A secret file is meant to stay "secret". This means it should be written directly in the file and make sure it doesn't end up in your commits - just throw it in .gitignore. It is your responsibility to handle and protect it.
I'd prefer if the secret file could work with encrypted values, like using sops.
Describe your feature request
Today, if we want to pass variables to Dynamic Secret Files, we have to hard-code the secret in the model. This can lead to some secrets being pushed to Github, for example.
A simple feature is to allow env variables to pass the secret to Dynamic Secret Files. Until such time as it is directly possible to retrieve secrets via third-party solutions.
Describe the use case of the feature
Handle env variables in dynamic variables field :
Example:
Describe alternatives you've considered
No response
Additional context
I made a very simple PR for this feature. #5835
The text was updated successfully, but these errors were encountered: