Skip to main content

Buildout recipe to define variables from external commands.

Project description

This recipe can be used to populate a buildout part with variables whose values come from external commands.

Fetch your secrets from the environment when possible, not from managed source code. In our example below, we move them to LastPass, write them to an unmanaged file during the buildout, and read them from the environment during execution.

You can use this approach in order to keep credentials and other sensitive secrets out of the repository.

A short example:

[sekrets]
recipe = sixfeetup.recipe.runvars
username = somedewd
password = `lpass show --password somedewd@some.api.com`

Now you are free to use ${sekrets:username} and ${sekrets:password} in other parts or templates as part of your buildout.

This is useful for populating environment variables as part of system configuration, for example.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

sixfeetup.recipe.runvars-0.2.0.tar.gz (3.2 kB view details)

Uploaded Source

File details

Details for the file sixfeetup.recipe.runvars-0.2.0.tar.gz.

File metadata

File hashes

Hashes for sixfeetup.recipe.runvars-0.2.0.tar.gz
Algorithm Hash digest
SHA256 197670f7c37646444360e9859a0cd98d74ca196cc41496e45446300575e79516
MD5 e9694e2c65eafa17f45d7c85cd97762d
BLAKE2b-256 db1d4c6f550a35eba894efbddc31b145ea30da11cab4c369480cb1e9cebdc5b4

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page