-
Notifications
You must be signed in to change notification settings - Fork 19
Import resolve config #37
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Fixes issue #36 where import command only looked for secrets in the active profile, missing secrets defined in the default profile. The import logic now collects secrets from both active and default profiles, using the existing resolve_secret_config() method for proper profile inheritance. - Add comprehensive test case reproducing the exact bug scenario - Create test fixture for issue #36 configuration - Update import logic to match behavior of list/validate commands - JWT_SECRET now imports correctly when using development profile 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <noreply@anthropic.com>
🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <noreply@anthropic.com>
|
Claude finished @domenkozar's task —— View job Code Review: PR #37 - Import resolve config
SummaryThis PR successfully fixes issue #36 where the Code Quality & Best Practices ✅Excellent implementation that follows existing patterns:
Bug Fixes ✅The fix correctly addresses the reported issue:
Test Coverage ✅Comprehensive test case added:
Performance Considerations ✅Minimal performance impact:
Security Concerns ✅No security issues identified:
Minor Suggestions
fn collect_all_secrets_for_profile(&self, profile_name: &str) -> HashSet<String> {
let mut all_secrets = HashSet::new();
if let Some(profile_config) = self.config.profiles.get(profile_name) {
for name in profile_config.secrets.keys() {
all_secrets.insert(name.clone());
}
}
if profile_name != "default" {
if let Some(default_profile) = self.config.profiles.get("default") {
for name in default_profile.secrets.keys() {
all_secrets.insert(name.clone());
}
}
}
all_secrets
}Changelog ✅The changelog entry accurately describes the fix and references the issue number. Verdict: APPROVED ✅This is a well-implemented bug fix that:
The code is ready to merge. The minor suggestion about extracting the common pattern could be addressed in a future refactoring PR but is not required for this fix. |
Deploying with
|
| Status | Name | Latest Commit | Preview URL | Updated (UTC) |
|---|---|---|---|---|
| ✅ Deployment successful! View logs |
secretspec | 1abb81f | Commit Preview URL Branch Preview URL |
Sep 10 2025, 01:23 PM |
|
Claude finished @domenkozar's task —— View job Code Review: PR #37 - Import resolve config
SummaryThis PR successfully fixes issue #36 where the Code Quality & Best Practices ✅Excellent implementation that follows existing patterns:
Bug Fix Analysis ✅The fix correctly addresses the root cause:
Test Coverage ✅Comprehensive test case added:
Performance Considerations ✅Minimal performance impact:
Security Concerns ✅No security issues identified:
Minor Suggestions
Changelog ✅The changelog entry ( Verdict: APPROVED ✅This is a well-implemented bug fix that:
The code is ready to merge. The implementation demonstrates good understanding of the codebase architecture and follows established patterns consistently. |
Fixes #36