-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Feature] - Key in state, release 1.2.0 #48
Conversation
- Adds a new feature, enhancing the format of the secrets envelope. The idea being that the user wont have to key in the key path more than once, and once a secret state file has a keyURI it will favor that keyURI and will aggressively check that the operator is storing secrets using the same KeyURI per state-file. This ships with a pretty invasive change to how we read/process/load secrets. I expect there to be a little fallout from this revision but nothing too un-patchable.
f38956b
to
a97c9b9
Compare
Seeing as how this is non-critical and its late on a Friday, this can totally wait :) Final output of my efforts today: coverage: 81.2% of statements Not 100% but that's a 50% improvement over previous builds. |
e1ca2f1
to
d2d84d6
Compare
e0e8de1
to
889c34a
Compare
Ok, Review feedback implemented and I think I got all the cases here. Thank you for the thorough review :) |
e69e836
to
a91144f
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Made one note about a log level, but otherwise LGTM!
- Updated the test cases for better clarity. - Implemented the review feedback - ran go mod tidy && removed unused go-spew sums from go.sum
a91144f
to
e5df7e6
Compare
idea being that the user wont have to key in the key path more than
once, and once a secret state file has a keyURI it will favor that
keyURI and will aggressively check that the operator is storing
secrets using the same KeyURI per state-file.
This ships with a pretty invasive change to how we read/process/load
secrets. I expect there to be a little fallout from this revision but
nothing too un-patchable.