Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Conversation

@caviri
Copy link
Member

@caviri caviri commented Apr 18, 2024

Some components require the loading of secrets as env. variables. If we use parameters, the value will get stored in the database. To avoid this. Here I implemented a method to load secrets when running odtp execution run .... These secrets are parsed using a similar method to the regular parameters and then they are loaded.

I tested this in odtp-travel-data-dashboard which requires a token and username to access to private repositories in github.

Next, I will test it in the odtp-sql-to-file component.

P.S. I also added a correction to the compose.yml as it wasn't sending the proper network to the child components.

@caviri caviri linked an issue Apr 18, 2024 that may be closed by this pull request
3 tasks
@caviri caviri mentioned this pull request Apr 18, 2024
3 tasks
Copy link
Contributor

@sabinem sabinem left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

praise: great that we have the ability to add secrets now on component runs.

One more thing can you please also update the change log, or should we do that after the merge of the PR?

compose.yml Outdated

networks:
odtp-network:
driver: bridge
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nitpick: Can you please add a blank line at the end of the file

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Fair, thanks!

@caviri caviri requested a review from sabinem April 19, 2024 07:00
@caviri caviri force-pushed the 63-secrets-compatibility branch from 29c7814 to 403470d Compare April 19, 2024 08:18
@caviri caviri removed the request for review from sabinem April 19, 2024 08:19
@sabinem sabinem merged commit 2934cc7 into main Apr 22, 2024
@sabinem sabinem deleted the 63-secrets-compatibility branch May 7, 2024 08:20
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Secrets compatibility

3 participants