-
-
Notifications
You must be signed in to change notification settings - Fork 691
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Mechanism for secrets in plugin configuration #538
Comments
Initial syntax suggestion: {
"title": "datasette-auth-github demo",
"plugins": {
"datasette-auth-github": {
"client_id": "986f5d837b45e32ee6dd",
"client_secret": {"$env": "GITHUB_CLIENT_SECRET"}
}
}
} |
Another useful option is the ability to load secrets from a file. This allows the file to have permissions set on it to only be read by the Datasette user. It also interacts well with the Kubernetes secrets mechanism, which is file-based. {
"plugins": {
"datasette-auth-github": {
"client_id": "986f5d837b45e32ee6dd",
"client_secret": {"$file": "/secrets/github-client-secret"}
}
}
} |
Re-opening this because I messed it up: the secret options are still visible in Lines 273 to 279 in a2d4593
|
See simonw/datasette-auth-github#1
We need a mechanism where by plugins can tap into "secret" config options without exposing them in the visible metadata.json (where plugin configs currently live, see https://datasette.readthedocs.io/en/stable/plugins.html#plugin-configuration )
The text was updated successfully, but these errors were encountered: