You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Actually thinking about it a bit more now, it may make more sense to store everything related to a given vendor in a single secret that is a json object. thinking back to using AWS Secrets Manager and that's actually how it's done: reference in which case Map as it is works totally fine.
I was hoping to move to ^ approach for secrets in our project. for local development our secrets are stored in 1password. A given secret in 1password would be set up like so:
attempting to add the secret to ftl led to the following:
❯ echo -n op://json-test/secret | ftl secret set json_test --op --json
ftl: error: secret is not valid JSON: invalid character 'o' looking for beginning of value
TBH, ^ was 50% expected as the --json flag when used with the --inline provider is expecting that actual secret provided to be json. with --op however (and i suppose --keychain as well) there's 1 additional level of indirection.
What i'm hoping to be able to do is something like the following and have it work regardless of the underlying secret provider thats being used (aws secrets manager in prod, op or keychain locally etc.):
per a discussion in a prior issue: #1295 (comment)
I was hoping to move to ^ approach for secrets in our project. for local development our secrets are stored in 1password. A given secret in 1password would be set up like so:
attempting to add the secret to ftl led to the following:
TBH, ^ was 50% expected as the
--json
flag when used with the--inline
provider is expecting that actual secret provided to be json. with--op
however (and i suppose--keychain
as well) there's 1 additional level of indirection.What i'm hoping to be able to do is something like the following and have it work regardless of the underlying secret provider thats being used (aws secrets manager in prod, op or keychain locally etc.):
Strongly typing the secret as described here: #1295 (comment) would be awesome
The text was updated successfully, but these errors were encountered: