Log inSkip to main contentSkip to sidebar
IMPORTANT: JAC is a Public system and anyone on the internet will be able to view the data in the created JAC tickets. Please donโt include Customer or Sensitive data in the JAC ticket.
Our product teams collect and evaluate feedback from a number of different sources. To learn more about how we use customer feedback in the planning process, check out our new feature policy.
Problem
We canโt configure custom steps that allow us to create/update encrypted variables when running a manual build.
It blocks use to update credentials in some testing scenarios.
We are looking forward as well to seeing this feature implemented. Also, it would be nice to be able to specify the default value for each variable,
Florian Antonescu
added a comment - We are looking forward as well to seeing this feature implemented. Also, it would be nice to be able to specify the default value for each variable,
This is an important feature especially from a security perspective. When will this be implemented ? It shouldn't be too hard, should it ?
EddieP
added a comment - This is an important feature especially from a security perspective. When will this be implemented ? It shouldn't be too hard, should it ?
Would like to ask where this feature is at? Is it still low on the priority list? It would really help with providing a gate check for deploying to certain environments if say a secure password was required to deploy to said environment everytime the pipeline is triggered.
Gavin Chin
added a comment - Would like to ask where this feature is at? Is it still low on the priority list? It would really help with providing a gate check for deploying to certain environments if say a secure password was required to deploy to said environment everytime the pipeline is triggered.
I was surprised this is not a thing, given that repo-level secure variables exist. Since `bitbucket-pipelines.yml` does not provide a separate `secrets:` keyword in addition to `variables:`, I would expect all variables to be treated as secrets.
Ruslan Fadeev
added a comment - - edited I was surprised this is not a thing, given that repo-level secure variables exist. Since `bitbucket-pipelines.yml` does not provide a separate `secrets:` keyword in addition to `variables:`, I would expect all variables to be treated as secrets.
https://support.atlassian.com/bitbucket-cloud/docs/variables-and-secrets/ and https://support.atlassian.com/bitbucket-cloud/docs/pipeline-triggers/ should probably mention this problem and this Jira issue, so that people won't accidentally log secrets.
This is something that we need. When would we expect to get an update on this?