Replies: 3 comments 3 replies
-
i wonder what the use case for such functionality. I mean, If you want secrets to stay encrypted using the builtin "spot" provider storing them in sqlite seems to achieve the same goal. This Making a new secrets provider for flat file is possible, and this is somewhat similar to what ansible provider is doing already. But I don't really get why this thing is needed and what exactly you expecting to store in such a file. |
Beta Was this translation helpful? Give feedback.
-
To clarify myself, maybe I got used to how env vars are handled by docker compose - you can specify them with value:
or without value
and in this case it would be read from environment of the command that runs In spot there is only first option as I understand. So I have to dump env vars in
No no, agree with you that it makes no sense - to store secrets in plain file
Thanks, that acctualy looks like a most likely option that I will use - |
Beta Was this translation helpful? Give feedback.
-
@umputun , spotted similar discussion about ansible https://serverfault.com/questions/681832/how-can-i-stop-ansible-from-writing-passwords-to-the-logfiles What do you think about the idea of having a similar task-level option, With this I could pass secrets directly as env vars, without need to call |
Beta Was this translation helpful? Give feedback.
-
Hi,
In regard to the impossibility of #182, I am wondering if it is possible to add a flag option to the CLI that would make env vars be treated as secrets?
My case -
load_secrets.sh && spot
, whereload_secrets.sh
script export secrets as env vars, so they would be accesable to spot playbook.Or maybe an option for setting secrets from env..
Beta Was this translation helpful? Give feedback.
All reactions