Replies: 1 comment 1 reply
-
Thanks for sharing. I think that would require to install Probably we could add a directory to run scripts at start-up, by default this directory will be empty, but it can be mapped to the outside with a volume, so any script there can be executed at start-up. It will require to install Something like this could do the work
at each point if there is a script i those directories it's executed. This will add flexibility for any secret manager and more cases. |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Thought I would share in case others are looking for different options for secret management.
I was somewhat reluctant to store my TWS_USERID and TWS_PASSWORD in a .env file, write them down in my dockerfile, or pass them in the command line (all these workflows are discouraged by docker for secret management). Even using docker secrets is a bit strange to me since it is effectively just a flat file stored on docker.
An alternative is to put the secrets in AWS secrets manager and give ec2 (or ecs or ssm) access to the ARN. Then, load the secrets into the environment at runtime only.
Locally, I added a script below, and I source this fn immediately before sourcing common.sh.
Works like a charm if you are already using AWS.
Open to suggestions if anyone has any!
Figured I'd throw this out there in case it's helpful to others.
Beta Was this translation helpful? Give feedback.
All reactions