-
Notifications
You must be signed in to change notification settings - Fork 93
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Create a method to use secrets in QHub config #13
Comments
To add why this seems like a reasonable path forward is that terraform does the exact same thing https://www.terraform.io/docs/configuration/variables.html#environment-variables |
The override should be done similarly to Terraform. E.g. suppose we have a config file
We would override via We would apply all environment variables that start with |
In the course of working on this, we realized that this will require a more nuanced approach. Editing the input config doesn't actually hide the secrets, as they will get written out in plain text in the |
Closing this issue since we don't think that adding this feature is a good idea due to the secrets being in the repo regardless |
I think a possible solution for Auth0 at least could be to use the Auth0 terraform provider: https://registry.terraform.io/providers/alexkappa/auth0/latest The management API key/secret can be in GitHub secrets / env vars going into The final step would be to take the client key/secret and pass it to jupyterhub config, probably through env vars. This way, the client key/secret isn't needed in the qhub-config.yaml at all. It would only be in the remote state. I haven't found a similar provider for GitHub but haven't looked hard yet... |
This issue has been automatically marked as stale because there was no recent activity in 60 days. Remove the stale label or add a comment, otherwise, this issue will automatically be closed in 7 days if no further activity occurs. |
This issue was closed because it has been stalled for 7 days with no activity. |
I will try to work through this in the next week or two. |
Reopening since this feature was removed in #1003. |
After discussion with @costrouc we realise we don't have a way to use secrets in the Qhub ops, one example is secrets are expected to be in the config.yaml (which is not ideal):
https://github.com/Quansight/qhub-ops/blob/e5dd52df558c2c4eb805594b6ae574f12e0986a1/tests/assets/config_aws.yaml#L11
The solution we came upon was to make qhub read from environment variables and refer those environment variables in the cookiecutter's generation of the project.
Some thing like:
The text was updated successfully, but these errors were encountered: