Replies: 1 comment
-
This can prove pretty useful in autoscaling environments. Keeping env vars safely and populating them is always a headache when setting up the ASG infra |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Hey!
The proposal to create some sort of a credentials storage is based on the same ideas as Rails already has implemented. Link to Rails docs here.
It allows you to keep your
ENV
secrets safe and sound inside your git repo and never lose them. Secrets are kept in an encrypted form in a credentials file and you have only to store a key file or phrase somewhere.What it may bring us:
.env
file was accidentally deleted or lostENV
variables manually for each deployment, but to have them in a git repo, decrypted and populated toENV
on app start.env
fileI am ready to help with this, the only problem is that it needs to be injected before
Env
provider is launched (somewhere here), so that it will be possible to overwrite values from credentials withEnv
variables. It is a core change, so it should be agreed by core members.What do you think?
Beta Was this translation helpful? Give feedback.
All reactions