-
Notifications
You must be signed in to change notification settings - Fork 138
Description
Rationale:
-
Environment variables raise security by removing hard-coded secrets. A PAT stored in an environment variable eliminates the need to embed credentials in scripts or configuration files. This allows each environment—development, testing, production—to supply its own token without code changes.
-
Environment variables streamline development workflows. Multiple developers can work in different environments while relying on the same code path; only the environment variable differs. CI/CD pipelines can inject the correct PAT at runtime, avoiding manual substitution and reducing deployment friction.
-
Environment-variable–based PATs integrate cleanly with containerized execution. Docker and Kubernetes can inject secrets into containers through their native mechanisms, keeping tokens isolated while maintaining controlled access for automation and tooling that depend on tfs-cli.
So, supporting PAT authentication through environment variables removes hard-coded credentials, simplifies configuration across environments, and aligns tfs-cli with common DevOps practices.