Replies: 80 comments 17 replies
-
Considering how organization level secrets are indirectly available to all users with |
Beta Was this translation helpful? Give feedback.
-
This feature will really reduce our work a lot. Please try to implement this. |
Beta Was this translation helpful? Give feedback.
-
Potentially the biggest improvement to GitHub in 2023 will be this (if it happens). |
Beta Was this translation helpful? Give feedback.
-
This feature will help us a lot! Due to this limitation, we've had to use organizational secrets per environment like K8S_SECRET_DEV and K8S_SECRET_PROD, and have replicated our workflows. |
Beta Was this translation helpful? Give feedback.
-
This feature would help us to avoid a lot of duplication. I would also add that in our case we need the approval to be defined on these environments as well. |
Beta Was this translation helpful? Give feedback.
-
+1 from me here - my use case is an Organisation that has multiple repos that host Terrafrom for Azure deployments - using github Environments / secrets for Service Principals / subscription ids etc. We have to duplicate secrets across the repos / environments . Just spent about an hour troubleshooting a missing one - so thats how i ended up here :-) |
Beta Was this translation helpful? Give feedback.
-
Here is one more concern: Imagine we have "development", "staging" and "production" environments How can we be sure that each and every repository will have them, e.g. I, as engineer, by mistake, created "testing" environment instead of "staging" At moment it seems that only possible way to manage this is to make environments via API only and by schedule check/fix drift in every repository |
Beta Was this translation helpful? Give feedback.
-
Is there any official plan on implementing organization level environment? |
Beta Was this translation helpful? Give feedback.
-
+1 on this. It would be really neat to be able to have org-level env secrets. It would reduce a lot of copypasta one has to do across org repos to create same environment settings. Any plans on making this available at all? |
Beta Was this translation helpful? Give feedback.
-
+1 on this. Do we have any updates if its even considered on a roadmap? |
Beta Was this translation helpful? Give feedback.
-
this++ We are looking at switching to another manager because without this it becomes very unwieldy |
Beta Was this translation helpful? Give feedback.
-
+1 Definitely this will reduce lot of duplication. |
Beta Was this translation helpful? Give feedback.
-
+1 I am migrating to Actions, and I thought this functionality existed. |
Beta Was this translation helpful? Give feedback.
-
+1 It's hard to understand why this feature hasn't been implemented yet, environment setup and secret rotation is a nightmare without it. |
Beta Was this translation helpful? Give feedback.
-
+1 We are microservices with ~80 repositories that all need to go to dev/staging/prod with terraform. I really don't fancy setting up environments with the exact same info for each repository 🙏🏻 |
Beta Was this translation helpful? Give feedback.
-
GitHub needs Organization Environment Secrets to address the gap between Organization Secrets and Environment Secrets. This feature would allow environment-specific secrets to be shared across multiple repositories in an organization, simplifying management and improving consistency for deploying to different environments (like Kubernetes clusters). Note: If you support this request, please upvote instead of replying with "+1" to avoid unnecessary notifications. |
Beta Was this translation helpful? Give feedback.
This comment was marked as off-topic.
This comment was marked as off-topic.
-
Please add this. |
Beta Was this translation helpful? Give feedback.
-
Use tools like GitHub Actions or Azure Pipelines, which offer secure storage and management of environment variables and secrets, to efficiently manage organizations and confidential data. By centralizing these, you can simplify updates when credentials or configurations change between environments, increase security by restricting access, and guarantee consistency across projects. |
Beta Was this translation helpful? Give feedback.
-
Hey! Sorry product has been quiet on this one :) I am trying to catch up going through all the items in discussions that have high engagement but we have quite a few 😱 We do have this scoped, but no timelines right now. Realistically this means we know we are not doing something this big within the next 6 months or so 😞 The roadmap is the place to look to see where we are investing, so please keep an eye there. |
Beta Was this translation helpful? Give feedback.
-
💬 Your Product Feedback Has Been Submitted 🎉 Thank you for taking the time to share your insights with us! Your feedback is invaluable as we build a better GitHub experience for all our users. Here's what you can expect moving forward ⏩
Where to look to see what's shipping 👀
What you can do in the meantime 💻
As a member of the GitHub community, your participation is essential. While we can't promise that every suggestion will be implemented, we want to emphasize that your feedback is instrumental in guiding our decisions and priorities. Thank you once again for your contribution to making GitHub even better! We're grateful for your ongoing support and collaboration in shaping the future of our platform. ⭐ |
Beta Was this translation helpful? Give feedback.
-
Another use case for this that I don't think was mentioned in this thread is for use with federated credentials. Currently for example Azure only supports per-repo or per-repo-per-environment This makes federated credentials virtually unusable unless you have a monorepo-type set up as every repository would mean having to add one environment and then updating the managed identity. The support for defining environments on a organization level and then associating these with federated credentials is currently preventing us from moving away from manually rotated client secrets. Azure DevOps does this (IMHO) correctly with the service connections and project-level environments. A manual approval with elevated permissions would be needed to prevent "rogue" repositories from hijacking credentials (also, look at AzDO) |
Beta Was this translation helpful? Give feedback.
-
If you have a lot of repositories with microservices deploying to the same environments (e.g. the same Kubernetes clusters, say), it can be useful to have a set of secrets available to all repositories in an organization. Of course, we already have this with Organization Secrets. However, this breaks down when some of those secrets - still common to many repositories within the organization - need to be distinct for different environments.
Environments and Environment Secrets are a great feature. Organization Secrets are a great feature. But, there's friction because you can't really use them together. We need Organization Environments and Organization Environment Secrets.
NOTE: If you want to show your support for this feature request, please upvote it using the upvote button
rather than replying with a "+1". Replies like that just result in sending spam to everyone else interested in the issue, and importantly, don't even "count" when it comes to how much GitHub will prioritize the issue. They're just spam, they're not spam that also counts as a vote in any way.
Beta Was this translation helpful? Give feedback.
All reactions