-
Notifications
You must be signed in to change notification settings - Fork 159
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use Environment variables for sensitive information #30
Comments
Environment variables are also insecure, although I agree that the chance of exposure is smaller. Other options would be encrypting the password with GPG (is there an R interface?) or using passwordless access. For instance, Postgres allows setting up passwordless access through a As a first measure, I think we should point out in big fat letters that using the "password" entry is a huge risk, and make sure that passwordless access works for all readers and all database types if configured properly. I think Travis is set up for passwordless access to a few database servers, but for many others we'll need to set up a server for testing. What kinds of database servers do you have access to? (I'm feeling that this is going to be a lot of work; we might want to wait for users to complain that passwordless access is not working instead.) On the other hand, we might as well start with supporting a new entry |
Passwordless didn't work with PostgreSQL. sigh... I have opened a branch (30-...) to handle these issues. |
Looking at the graph, has 30-passwordless been merged completely into develop? Should this work be done in develop now or still in 30-passwordless? |
I'm somewhat following git-flow, but currently without any extra tools. This means that |
We can follow git-flow. I had set up 0.6.0 as a development branch for the next release. Would you like me to merge 0.6.0 into develop (it includes the .add.extension work) and then we can follow the git-flow approach? Also, let's clean up the branches that have already been merged, like warnings-are-errors (I think that was already been merged??) |
We can use two "development" branches for now, one for 0.6.0. The individual features still should be in feature branches, I think. The
at least once. I also have
in my As for the branches, we can delete the feature branches as soon as they are merged using the GitHub front end, given how easy it is to restore them. The |
@KentonWhite: I'd like to merge relevant parts of the 0.6.0-new branch into master. We need to push an update to CRAN soon, due to deprecation of the Defaults package (#100). Could you please convert it to meaningful pull requests? |
Back to the issue: Storing the password in an environment variable (specified by the |
In the .sql file, it'd be great to be able to do the following:
Unfortunately, these are read as literal strings. |
Some of the readers, like the SQL readers, require password information. Currently this is stored directly in the data file. Storing passwords in files is a security risk -- they can be checked into repositories or made accessible to the public.
Other communities use environment variables to store sensitive information. Can you do this in ProjectTemplate?
The text was updated successfully, but these errors were encountered: