Is your feature request related to a problem? Please describe.
many CLI tools rely on local plaintext files to function, e.g. aws cli, azure cli, ...
These creds can find their way into repos if not kept ephemeral.
Describe the solution you would like
Inject those secrets into a file template, where the instantiated file is mmapped.
something like if secrets.yml were:
FOO: !var <secret-id>
BAR: !var <secret-id>
CRED_FILE: !var:template <local-template-file-path> << note !var:template tag
which (as with !var:file) created an mmapped file, but of the local template.
Is your feature request related to a problem? Please describe.
many CLI tools rely on local plaintext files to function, e.g. aws cli, azure cli, ... These creds can find their way into repos if not kept ephemeral.
Describe the solution you would like
Inject those secrets into a file template, where the instantiated file is mmapped.
something like if secrets.yml were:
which (as with !var:file) created an mmapped file, but of the local template.
If the local template file were:
Summon could replace the placeholders with their identically named env vars.
Describe alternatives you have considered
create a !var:file entry in secrets.yml as a placeholder:
Summon calls a script which sed copies the template into the mmpapped file, e.g.:
Additional context
This comes up with some frequency and would provide a nice generalized templating capability.