-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Feature Request] Specify environment variables inside repos.yaml #1769
Comments
We are looking for the same feature. Would you commit the secrets to your repo in the case you had the environment variables section in the repos.yaml? I do not think it is secure enough. |
can I see a use case for this ? one that doesn't imply a bad practice such as dropping secrets into a repo. |
I believe it would be best if it was possible to specify environment variables that should be included from the host. Thus in the yaml we would just define variables that should be passed forward to the server from the host. Then it would be possible to store the YAML in a repo without leaking them. The specified variables should be checked for their existence when starting the server the same way the repos.yaml is check for any errors. I believe this way would be most secure. |
Hi @djboboch, We implemented a similar feature you described and waiting for the community review. Plese check this: |
We did something similar for AWS Secrets Manager. We look for a secret based on a known convention, and pull that secret, setting |
Hello everyone, anyone got any feedback regarding this issue? We are currently trying to figure out a specific problem:
Since we are using Atlantis as an app, every repo has all the permissions, which can be tricky (a repo refering to a client's GCP project also has permissions to mess around with other Azure/AWS client projects) within the same terraform project. You just have to specify a different provider and you're there. We should be able, server-side, to force a list of variables to limit the endpoints that each repo can target with atlantis. What we are currently doing, for more sensitive projects, is trying to apply pre-workflow hooks to provide a specific PAT for Atlantis to use. And that workflow is only triggered for specific repos. EDIT: Grammar verification. |
Any news? Need this feature... |
is this still happening with |
Various infrastructure repositories require different credentials for managing the infrastructure. Right now there is no easy way to pass environment variables to Atlantis workflow to be accessible only to one repository.
I propose to create, inside of the repos.yaml, a field environment similar to docker-compose to be able to pass in repository specific variables.
This feature would be great for passing in secrets that terraform uses, especially for provider specific variables that change depending on a repository.
I would be more then willing to implement this feature, however I would need some guidance from the team where to begin in the code and the best approach to take.
The text was updated successfully, but these errors were encountered: