builtin variables

argument stack attributes worker/script env var default
share directory stack.config0_share_dir CONFIG0_SHARE_DIR /var/tmp/share
vars directory stack.config0_vars_dir CONFIG0_VARS_DIR <CONFIG0_SHARE_DIR>/config0/variables/<SCHEDULE_ID>
credentials directory stack.config0_creds_dir CONFIG0_CREDS_DIR <CONFIG0_VARS_DIR/credentials
inputvars directory stack.config0_inputvars_dir CONFIG0_INPUTVARS_DIR_ <CONFIG0_VARS_DIR>/inputvars

example builtins 2

# find .

/var/tmp/share/
/var/tmp/share/config0
/var/tmp/share/config0/variables
/var/tmp/share/config0/variables/default
/var/tmp/share/config0/variables/5c245
/var/tmp/share/config0/variables/5c245/credentials
/var/tmp/share/config0/variables/5c245/credentials/eval-config0-iam.json
/var/tmp/share/config0/variables/5c245/credentials/eval-config0-iam.env
# cat /var/tmp/share/config0/variables/5c245/credentials/eval-config0-iam.json

{ "AWS_ACCESS_KEY_ID": "AKIXROA6A63", 
  "AWS_SECRET_ACCESS_KEY": "WdGqjHA2OLIyNa6cOoePtxjz" }
# cat /var/tmp/share/config0/variables/5c245/credentials/eval-config0-iam.env

AWS_ACCESS_KEY_ID=AKIYTDROAS63
AWS_SECRET_ACCESS_KEY=WdGqjP49byxOLI6xjz

  1. The stateful_id is randomly generated and used to store the state files and a sanitized copy of the Infrastructure as Code (IaC) code in a user’s S3 bucket. 

  2. Sensitive variables are automatically deleted, and the worker instance is also destroyed after an hour or two. As a result, sensitive variables do not persist for an extended period of time.