-
Notifications
You must be signed in to change notification settings - Fork 1
Document Cloud limitations #2
Comments
@aaronsteers I thought that Meltano permitted the use of env vars within Why don't we let any env var be expanded here? If that were possible, a user could easily add their private Python package index credentials to the encrypted Ignoring Meltano Cloud for the moment, this seems like a current issue with Meltano. To use a private Python package index currently within Meltano, doesn't one need to put their credentials in plaintext within |
Not for any deliberate reason I'm aware of. We've been incrementally doing a bit of 'whack-a-mole' to expand where env vars are accepted. cc @cjohnhanson who has been making progress increasingly here and might be able to speak to relative level of effort to tackle Related topic:
One potential workaround would be to provide something like TAP_SNOWFLAKE__PIP_URL within the encrypted cc @edgarrmondragon who might know of other options or have additional context. |
I think the main reason we have not prioritized environment variables in the So pip_url: '--only-binary=":all" --index-url https://pypi.org/simple my-package' can be set with a simpler string pip_url: 'my-package' and env vars PIP_ONLY_BINARY=":all:" \
PIP_INDEX_URL="https://pypi.org/simple" \
meltano install Which is probably preferable in most situations. |
@edgarrmondragon Using By using per-plugin A downside to this approach is that it breaks our venv reuse strategy, which relies on the |
Archiving this repo since now the docs are in our main docs. |
Task is to make sure all of these are documented.
As of now not confirmed for GA:
key_file_location
(no 'secrets file' support in scope. recommendation: use other config inputs for auth).Confirmed for GA, but not in Alpha or Early Beta:
container_spec
support.pip_url
access. (Although may be possible to solve automatically by using an encrypted.env
file.)The text was updated successfully, but these errors were encountered: