Skip to content

Secure way to handle environment variables? #277

@myhro

Description

@myhro

How can I handle environment variables in a secure way, e.g. not explicitly writing them on Dockerfile or fig.yml? This is needed for settings like Django's SECRET_KEY.

I've tried some approaches, without success:

  1. Load them from a file that is on .gitignore
  2. Load them from the current env which fig is called, using "_env:VARIABLE_NAME[:DEFAULT]", like docker-registry
  3. Specify them as an argument of fig up, to be passed to the docker client as -e

I'll try to implement the second one (guess it needs just a little modification here), but if someone is already doing this in another way, I would really like to know.

Regards,
Tiago.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions