You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We added the ability to use secrets in the includeConfig path in #4840 . This works for local secrets, but not AWS secrets, because AWS secrets requires the xpack-amzn plugin and the config is resolved before plugins are loaded, since the config may include additional plugins.
To fix this I think we would need to load plugins in two phases, adding an "early" phase which happens before the config is resolved.
Not sure how much demand there is for this use case, but it would include any AWS Batch run in Seqera Platform that loads a private config using a secret credential.
bentsherman
changed the title
Using secrets in includeConfig doesn't work with AWS secrets
Using AWS secrets in includeConfig doesn't work
Sep 18, 2024
Bonus functionality that could be unlocked if we can get AWS credentials in for config loading: the ability to load a Nextflow config file from s3:// (in addition to local / http etc).
We added the ability to use secrets in the
includeConfig
path in #4840 . This works for local secrets, but not AWS secrets, because AWS secrets requires the xpack-amzn plugin and the config is resolved before plugins are loaded, since the config may include additional plugins.To fix this I think we would need to load plugins in two phases, adding an "early" phase which happens before the config is resolved.
Not sure how much demand there is for this use case, but it would include any AWS Batch run in Seqera Platform that loads a private config using a secret credential.
cc @markpanganiban
The text was updated successfully, but these errors were encountered: