Replies: 4 comments 17 replies
-
Thanks for jotting down your thoughts Jorge :) I'll try to share my thoughts mainly as a user/maintainer of the pipelines which would run through the
Agreed, I think that the Therefore, the
For this part, I think we have options A a plugin-level CLI subcommandThis option is mentioned here https://www.nextflow.io/docs/stable/cli.html#plugin to make the experience of managing Couple of benefits of this approach are
For example
Extend the
|
Beta Was this translation helpful? Give feedback.
-
so this branch is a first iteration for this feature https://github.com/nextflow-io/nf-nomad/tree/secrets-template How to test:
see the logs and check the process print the 2 values https://github.com/nextflow-io/nf-nomad/blob/secrets-template/validation/secrets/main.nf |
Beta Was this translation helpful? Give feedback.
-
I've improved a little more current implementation (branch Now you don't need the extra repository jagedn and can be tested using In this implementation you can enable/disable secrets and also specify the path where the variables are stored in the cluster If secrets is disabled then LocalSecretsProvider is used so an user can run the same pipeline using their own secrets (so they are visibles in the job definition) or use the nomad variables, so they are attached as templates in the job definition |
Beta Was this translation helpful? Give feedback.
-
I'll closed this discussion as the secret implementation is merged and working |
Beta Was this translation helpful? Give feedback.
-
Following our internal discussion I would like to write down the idea and concerns about it
Say we have following pipeline
In this pipeline Nextflow will use, by default ,
LocalSecretProvider
and the nomad job submitted will have at some placeMY_ACCESS_KEY=123-123
so everyone with access to the definition will be able to see the secret valueBasically, (if I understood well), we want avoid to "write" secrets into the task definition and use nomad
variables
, https://developer.hashicorp.com/nomad/docs/concepts/variablesThe idea them is:
nomad var put -out=table secret/creds passcode=my-long-passcode
for example)templates
attach their values as environment variables (also as files but we'll restrict to env by the moment)nf-nomad plugin will "detect" which secrets are required by a process and will create a template section in the job definition
cc @abhi18av
Beta Was this translation helpful? Give feedback.
All reactions