-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Secret env command #265
Secret env command #265
Conversation
Recreated this from: #210. |
62eea19
to
10a51e0
Compare
10a51e0
to
62eea19
Compare
62eea19
to
007e85b
Compare
007e85b
to
62eea19
Compare
62eea19
to
0fa5f5c
Compare
0fa5f5c
to
62eea19
Compare
62eea19
to
0fa5f5c
Compare
At the moment I am testing the basic exporting of secrets into the current shell by echoing the variable name:
However, exporting secrets into a subshell I've had to do a bit differently:
|
So |
The |
ae7bb01
to
4729f95
Compare
4729f95
to
5695be2
Compare
For So we were going to pull the source code into the polykey library in order to fix this instead of just npm installing it |
When revisiting this, it will be worthwhile to take another look at the discussion had with Scott: https://vimeo.com/manage/videos/654376139 |
When addressing secrets related commands, we should review this too @tegefaulkes. |
Superseded by #505. |
Description
This PR aims to refactor the existing
pk secret env
command according to the specifications outlined in the Development Environment Usecase. Essentially the command should be able inject environment variable or allow sourcing variables into an existing subshell.Issues Fixed
pk secrets env
command for meeting Development Environment Usecase Polykey-CLI#31Tasks
pk secrets env
can be used to inject environment variables and run a subprocesspk secrets env
can be used to source environment variables and output something that can be used as a file to be sourced by a shellsecret env
command executing a subshellFinal checklist
npm test -- tests/bin/secret.test.ts
)npm test