Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

Proper secrets management from environment that also does not interfere with developing process #489

Closed
salboaie opened this issue Dec 21, 2021 · 1 comment
Assignees
Labels
Chore Highly technical tasks that are required

Comments

@salboaie
Copy link
Member

No description provided.

@salboaie salboaie added the Chore Highly technical tasks that are required label Dec 21, 2021
@salboaie
Copy link
Member Author

  • in node.js
    • process environment variables could overwrite the content of the environment.cfg file (for each domain a separate one)
    • secrets should be also shared using process environment variables
    • for development: secrets environment variables or normal environment variables are created at boot of the components (environment.secrets and environment.cfg files for each domain so their content can survive between restarts of the APIHub
    • for the CLI processes, environment.cfg and environment.secrets are stored in the home folder of the user
  • in SSApps there are no process variables and the environment.json is always used as in the current implementation

# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
Chore Highly technical tasks that are required
Projects
None yet
Development

No branches or pull requests

4 participants