-
-
Notifications
You must be signed in to change notification settings - Fork 47
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow for a list and no searching for keys #46
Allow for a list and no searching for keys #46
Conversation
Thank you for your pull request. I have two observations:
Thanks. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
As per the previous comment.
- Remove extra boolean flag
- Revert some code style changes.
...k.Extensions.Configuration.AWSSecretsManager/Internal/SecretsManagerConfigurationProvider.cs
Outdated
Show resolved
Hide resolved
...sions.Configuration.AWSSecretsManager/Internal/SecretsManagerConfigurationProviderOptions.cs
Outdated
Show resolved
Hide resolved
...sions.Configuration.AWSSecretsManager/Internal/SecretsManagerConfigurationProviderOptions.cs
Outdated
Show resolved
Hide resolved
tests/Tests.Extensions.Configuration.AWSSecretsManager/ConfigurationProviderExtensions.cs
Outdated
Show resolved
Hide resolved
Addressed all feedback, thanks for the quick review! |
Hi @scott-phillips-ah, sorry I disappeared. I'm not totally happy with the name of Also, would you be so kind to update the |
Hey, no worries. Good call on that. I changed it to what you specified, the alternative I'd use is |
Would the application fail to start if a secret with one of the specified Arns were to be missing? If not, i don't think |
In our case, it would. But I wouldn't say that is true in every case. We can leave it as it is. |
Feel free to merge whenever. |
Any updates on this? I'd be happy to test or do whatever is needed to get this merged. I'm very excited for the feature ^_^ |
Hi @killianhale-earnin, could you take care of updating the readme? Also if you could try the feature in the wild, using one of the nightly builds, it would be great. |
@killianhale-earnin @Kralizek the README has been updated per your request. |
@scott-phillips-ah @killianhale-earnin I'll release a new version once #47 is merged in :) |
Searching for keys makes the secrets manager configuration require the ListSecrets permission, which some organizations don't like to grant to services. This PR allows users to define a list of secret ARNs to load, and it only loads those. Filtering still works, but I don't see a good reason to use a filter with a defined secrets list.
Test created and passed. Not sure the best way to develop an example