Skip to content
This repository has been archived by the owner on Apr 22, 2020. It is now read-only.

Allow greater flexibility in populating Landscaper secrets #43

Closed
shanesveller opened this issue Apr 19, 2017 · 2 comments
Closed

Allow greater flexibility in populating Landscaper secrets #43

shanesveller opened this issue Apr 19, 2017 · 2 comments

Comments

@shanesveller
Copy link

Superset of #42. I would love to have pluggable sources for secrets other than environment variables, such as a local file, Hashicorp's Vault, other remote K/V stores like Etcd/Consul, etc. Of course, you could wire up basically any of what I've mentioned to populate env vars with a little glue code, often surprisingly little. But env vars have some trade-offs that prevent them from being some user's first choice for sensitive data, myself included.

@rollulus
Copy link
Collaborator

rollulus commented Apr 20, 2017

Agreed, shane. Actually, the environment based SecretsProvider was a place holder until we had Vault in place -- which isn't the case yet so far.

@rollulus
Copy link
Collaborator

rollulus commented May 5, 2017

I'll interpret this issue as referring to the flexibility in the code, which was worse than I believed. I'll address that, and keep track of specific secret sources (e.g. files, Vault) via specific issues, e.g. #54. If you have some specific wishes, @shanesveller, please open an issue -- or rather: contribute. Thanks!

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

2 participants