-
Notifications
You must be signed in to change notification settings - Fork 38
Set application secrets #27
Comments
Hmm yeah. Hadn't considered but yeah, totally doable. Will add this week. |
Amazing stuff. Thank you so much @DAlperin! |
@ilrock out of curiosity how do you currently manage secrets in terraform. Do you use a secrets.tfvar file or some such or do you integrate with a secret service? |
Hey @DAlperin! Sorry just seen this. Either way - at the moment I'm prepending my secrets with |
Hi, what's the status? Would love to configure secrets as well. |
@StarpTech coming soon! I've had some health problems, so my work has been limited. But this is definitely coming. |
Thanks for the update. Get well soon! |
Any update on this? Just ran into this and the only real alternative is to use some kind of vault and then connect to it using an initial secret. |
I would also love to use this feature. At the moment, I have to do some unsavory workarounds to make sure that secrets exist before I use |
Yeah, I'll take another crack at this later this week. Sorry for the delay. Been crazy buzy. |
I've written a basic implementation of a resource "fly_secret" "my_app_secret" {
app = fly_app.my_app.id
name = "SECRET_PASSWORD"
value = "top-secret-value"
} |
Turns out that's not a good solution with non-machine apps because it'll trigger a new release & deploy for every single secret. Implemented instead as |
@DAlperin it would be great if you happen to have any time to look at this. |
Is it possible at the moment (or will it be possible at some point) to set application-level secrets? It would be cool to have a terraform-based alternative to running
flyctl secrets set foo=bar -a XXXXXXX
The text was updated successfully, but these errors were encountered: