Skip to content

Secure way to handle environment variables? #277

@myhro

Description

@myhro

How can I handle environment variables in a secure way, e.g. not explicitly writing them on Dockerfile or fig.yml? This is needed for settings like Django's SECRET_KEY.

I've tried some approaches, without success:

  1. Load them from a file that is on .gitignore
  2. Load them from the current env which fig is called, using "_env:VARIABLE_NAME[:DEFAULT]", like docker-registry
  3. Specify them as an argument of fig up, to be passed to the docker client as -e

I'll try to implement the second one (guess it needs just a little modification here), but if someone is already doing this in another way, I would really like to know.

Regards,
Tiago.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions