Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Setting environment variables securly #2106

Open
yuvadm opened this issue May 27, 2024 · 2 comments
Open

Setting environment variables securly #2106

yuvadm opened this issue May 27, 2024 · 2 comments

Comments

@yuvadm
Copy link

yuvadm commented May 27, 2024

Documentation states that all environment variables, global or per-stage, should be set in .chalice/config.json.

However, assuming config.json is committed to source control, this is a bad practice that commit secrets to a shared project.

Setting environment variables directly through the AWS Lambda web UI is a non-solution since they will be deleted / overridden on the next chalice deploy.

What's the best way to store env vars in a secure way that also allows committing config.json to source control?

@AmirFone
Copy link

AmirFone commented Jun 3, 2024

Maybe use AWS Systems Manager and then fetch at runtime as a best practice, and a secure solution

@yuvadm
Copy link
Author

yuvadm commented Jun 3, 2024

@AmirFone interesting proposal, but right now I'm using a very lean deployment of Lambda/Chalice and would prefer a solution that does not involve any additional AWS products that will bloat my deployment.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants