Skip to content

Commit

Permalink
Merge pull request #177 from runatlantis/bschaatsbergen-patch-1
Browse files Browse the repository at this point in the history
remove non existent links
  • Loading branch information
bschaatsbergen authored Jan 26, 2025
2 parents 869bf48 + 7b75f07 commit bcd2222
Showing 1 changed file with 1 addition and 5 deletions.
6 changes: 1 addition & 5 deletions examples/secure-env-vars/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -36,11 +36,7 @@ Atlantis allows you to configure everything using environment variables. However

### Setting sensitive environment variables

Use a wrapper Atlantis Docker image to set environment variables that contain sensitive values. See the following examples for more details:

- [**Cloud Build**: pull secrets from Google Secret Manager](https://github.com/runatlantis/terraform-gce-atlantis/tree/master/examples/secure-env-vars/cloudbuild.yaml)
- [**GitHub Actions**: pull secrets from Google Secret Manager](https://github.com/runatlantis/terraform-gce-atlantis/tree/master/examples/secure-env-vars/.github/workflows/docker-gcp-secrets.yaml)
- [**GitHub Actions**: use GitHub secrets](https://github.com/runatlantis/terraform-gce-atlantis/tree/master/examples/secure-env-vars/.github/workflows/docker-github-secrets.yaml)
Use a wrapper Atlantis Docker image to set environment variables that contain sensitive values.

You can export sensitive values in the [`custom-entrypoint.sh.tftpl`](custom-entrypoint.sh.tftpl) script, which will be executed as the container entrypoint.
This strategy allow us to use the base Atlantis image, and to export environment variables that do not appear in the Console (e.g. ATLANTIS_GH_WEBHOOK_SECRET).
Expand Down

0 comments on commit bcd2222

Please sign in to comment.