Drupal is a registered trademark of Dries Buytaert
drupal 11.3.7 Update released for Drupal core (11.3.7)! drupal 11.2.11 Update released for Drupal core (11.2.11)! drupal 10.6.7 Update released for Drupal core (10.6.7)! drupal 10.5.9 Update released for Drupal core (10.5.9)! cms 2.1.1 Update released for Drupal core (2.1.1)! drupal 11.3.6 Update released for Drupal core (11.3.6)! drupal 10.6.6 Update released for Drupal core (10.6.6)! cms 2.1.0 Update released for Drupal core (2.1.0)! bootstrap 8.x-3.40 Minor update available for theme bootstrap (8.x-3.40). menu_link_attributes 8.x-1.7 Minor update available for module menu_link_attributes (8.x-1.7). eca 3.1.1 Minor update available for module eca (3.1.1). layout_paragraphs 2.1.3 Minor update available for module layout_paragraphs (2.1.3). ai 1.3.3 Minor update available for module ai (1.3.3). ai 1.2.14 Minor update available for module ai (1.2.14). node_revision_delete 2.0.3 Minor update available for module node_revision_delete (2.0.3). moderated_content_bulk_publish 2.0.52 Minor update available for module moderated_content_bulk_publish (2.0.52). klaro 3.0.10 Minor update available for module klaro (3.0.10). klaro 3.0.9 Minor update available for module klaro (3.0.9). layout_paragraphs 2.1.2 Minor update available for module layout_paragraphs (2.1.2). geofield_map 11.1.8 Minor update available for module geofield_map (11.1.8).

recipe_secrets

3 sites Security covered
View on drupal.org

Recipe secrets module allows the use of secrets in configuration files imported from a recipe. It retrieves secret values from a .env file, ensuring sensitive data remains secure and separate from the exported configuration. This improves security and flexibility by preventing hardcoded credentials in configuration management.

Features

  • Automatically replaces placeholders in configuration files with values from a .env file.
  • Load different secrets for different environments without modifying configuration files.
  • Works within the configuration import process to apply secrets dynamically.

Usage

  1. Enable the Module: Ensure that the Recipe Secrets module is activated before importing configurations by your recipe.
  2. Define Secrets in the `.env` File: Create or update your `.env` file with the required secret values.
  3. API_KEY=your-api-key-here
    DB_PASSWORD=your-secure-password
  4. Reference Secrets in Your Configuration Files
  5. Use the `!secret` syntax to reference secrets in your YAML configuration files.
    The module will automatically replace these references with values from the `.env` file during the import process.

    pi.settings:
      api_key: '!secret {{API_KEY}}'
    
    database:
      password: '!secret {{DB_PASSWORD}}'

Activity

Total releases
4
First release
Mar 2025
Latest release
1 year ago
Release cadence
4 days
Stability
75% stable

Release Timeline

Releases

Version Type Release date
1.0.2 Stable Mar 18, 2025
1.0.1 Stable Mar 7, 2025
1.0.0 Stable Mar 6, 2025
1.0.x-dev Dev Mar 6, 2025