-
Notifications
You must be signed in to change notification settings - Fork 18
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow fetching configs from remote sources (s3, http) #33
Conversation
Pull Request Test Coverage Report for Build 637
💛 - Coveralls |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is correct. But in an ideal world, I would like something more generic (not AWS SM specific).
Like:
config-location: arn:aws:secretsmanager:region:account-id:
or
config-location: arn:aws:ssm:region:account-id:document/tgf/config
or
config-location: /shared-drive/path/tgf-config/
or even
config-location: https://github.com/company/tgf-config/
combined with:
config-default: tgf-config
config-path: ops-config:infra-config:test-config
I like using |
I understand your point, but the idea here to have a location is to be able to also fetch other configurations and be able to override the default config locally without having to replace the whole string. example, we have: in parameter store: We then fetch If I want to override the config-default in my test, I simply have to override Then the system will try to fetch confguration from Or I can also specify: Then the system will try to to fetch: I voluntary inverted the two last paths to ensure that the first config declared in config-path has precedence. Also, in the future, we may add support for other |
Alright, it just seems like a weird config. It works now because the I'm just giving scenarios where saving ourselves from writing |
I would say that if the user specify a full-length config, then we should simply consider it as an absolute path vs a relative path. The idea here is not having our users to know the account number of the base path if they simply want to add override or extra configuration (path). Regarding the bug. I had this problem because I did not store back the secret value after changing the KMS key. I simply have to overwrite the value to make it works. |
It's not the same then. I think my issue stems from
Here: https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_GetSecretValue.html I have a new
|
Ready for review @jocgir |
config.go
Outdated
configPaths = strings.Split(configPathString, ":") | ||
} | ||
|
||
aws_helper.InitAwsSession("") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The remote configuration could be elsewhere than AWS. We should init the AWS Session until it is absolutely required.
No description provided.