Ian OLeary
03/12/2024, 6:40 PMhaleemur_ali
03/12/2024, 9:10 PMhaleemur_ali
03/12/2024, 9:12 PMhaleemur_ali
03/12/2024, 9:19 PMenvironment
as a list of variable names
normally, the variables would get passed from the host environment to the container environment.
However, our cli application allows fetching the secrets and passing it into a process like below, and the benefit is that the credentials don't stick around in my host environment afterwards.
op run --env-file .creds --no-masking -- docker compose run melty tap-example target-example.
As soon as the container exits, the secrets go poof. Accessing the secrets requires biometrics / password, so they are protected before getting fetched from the vault.
Rotating these development credentials is simple (we have to update the secrets in 1 place to which data team have references.
the file .creds
doesn't actually contain any secrets, just secret references. each line resembles something like this:
MELTANO_ZENDESK_CLIENT_SECRET="<op://Data/zendesk/client-secret>"
haleemur_ali
03/12/2024, 9:23 PMhaleemur_ali
03/12/2024, 9:25 PMvisch
03/12/2024, 11:36 PMMatt Menzenski
03/14/2024, 6:36 AMMatt Menzenski
03/14/2024, 6:37 AMIan OLeary
03/14/2024, 1:23 PM