Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Simplify input of Kubernetes secrets in the pipeline editor #2750

Closed
ptitzler opened this issue Jun 1, 2022 · 0 comments · Fixed by #2927
Closed

Simplify input of Kubernetes secrets in the pipeline editor #2750

ptitzler opened this issue Jun 1, 2022 · 0 comments · Fixed by #2927
Assignees
Labels
component:pipeline-editor pipeline editor kind:enhancement New feature or request
Milestone

Comments

@ptitzler
Copy link
Member

ptitzler commented Jun 1, 2022

Is your feature request related to a problem? Please describe.
Version 3.9.0 introduced support for Kubernetes secrets, enabling users to make sensitive information available to notebooks/scripts via environment variables, without exposing sensitive information in the pipeline editor^, the pipeline file^^, or the runtime environment^^^. The current input format ENV_VAR=secret-name:secret-key (see instructions) is not user friendly.

^ the secret's value is never displayed in the GUI, nor is it ever accessed or logged by Elyra
^^ only the secret name and the secret's key is stored in the .pipeline file and generated DAGs, but not its value
^^^ assuming that access to the Kubernetes secret is protected and its value not exposed by the notebooks/scripts during execution (e.g. via logging)

Describe the solution you'd like

Replace the current string based input with a widget that's intuitive to use.

See related issue #2738, which raises the same requirement for data volume input.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
component:pipeline-editor pipeline editor kind:enhancement New feature or request
Projects
None yet
Development

Successfully merging a pull request may close this issue.

3 participants