-
-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add show/hide toggle for secret variables #109
Comments
@sanbhattdeep Yes, this is on the roadmap. I imagine an eye icon next to the delete button to toggle the visibility of the value. @ajaishankar Need your feedback on the DSL implications of above feature. vars {
host: https://api.github.com
~token: secret
} The I am thinking to add a new tag called as vars: hidden {
token: secret
} |
I had also commented in #122 that maybe a different way to store secret values would be to put them into a separate env file. For example you might have a test environment with the following 2 file: test.bru
test.secret.bru
The advantage would be that you can add |
@helloanoop sorry for the late reply... Questions:
In the DSL, we could store secret vars as follows.
The above scheme would allow a team to just share a key with members instead of a .git ignored secret file. |
@ajaishankar we want to mask it in the UI. We also don't want to check-in plain text secrets So we have two options
We could also do the best of the both worlds where secrets get stored in .secret.bru file And a meta tag inside that optionally specify the encryption and the encryption algo. Ex:
I do like us to be as less opinionated as possible and give a wide variety options for people on how they want to manage the secrets. @ajaishankar @inneon thoughts? |
IMO the
Not sure how vars specified (only) in a secret .git ignored file would work when another dev pulls the collection from git. |
Let's say that a company has a strict policy of not checking in secrets in git. (even encrypted). The company might be using a centralised secret management to share passwords. In that case, the This was @inneon point in #122
Nice, I like this simpler approach of specifying algo. |
Understood the concept. My only point was
if we have to get this to work then Bruno would have to save a secret variable as this.
Exactly what yourself and @inneon suggested. Took me a while to understand 😄 There is no need for encryption in this approach. Let's avoid it... |
To answer the DSL question, imo the following reads nice... There is this variable
|
When we are creating collection/environment variables that contain secrets , there should be a toggle to show/hide the values
Bruno version:- v0.10.2
The text was updated successfully, but these errors were encountered: