-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Customize AwsSecretsManagerEnvironmentRepository. #2357
Customize AwsSecretsManagerEnvironmentRepository. #2357
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm afraid there can't be breaking changes. Can you describe exactly what you are trying to accomplish with this?
The foundation for this PR is coming from real life experience. I’m reading config properties from 2 sources. One is Git which contains non sensitive data such as server port, context path etc. Every time I release to production I create a new tag, i.e. v1.0. That gives me ability to rollback my config. Then there are secrets, passwords etc. They’re stored in the AWS Secrets Manager. These might change regularly. Rolling back to older version doesn’t work as password might be invalid. So I don’t version secrets. When I make /{application}/{environment}/{version} request it would read secrets from AWS Secrets Manager only labeled as {version}. As these properties don’t exist I get empty response. I know I can create my own repository but there are several drawbacks.
This looks like too much hassle and risk if anything changes in the upstream for such a small request. |
Thanks for the detailed response. Changing from a class to an interface is not possible right now. We can add constructors, if that helps. If you are willing to rework, let me know. |
The build failures are checkstyle errors |
Can you have a look at this alternative solution #2358? |
Should we close this PR then? |
Yes, I’m closing it. |
No description provided.