Replies: 2 comments
-
The feature was approved in the committers' meeting on Wed, Dec 4th 2024, an issue will be created shortly. |
Beta Was this translation helpful? Give feedback.
0 replies
-
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
(This discussion originated from issue #4648.)
I noticed some inconsistencies in how sensitive application property values are resolved across different extensions.
Currently, we lack a standardized approach for managing secrets. Different extensions seem to handle vault and configuration lookups in slightly different ways, which can lead to confusion (see issue above).
@paullatzelsperger suggested implementing a more uniform strategy for managing sensitive configuration properties. The proposed approach would introduce a standard two-tier configuration resolution method:
For any sensitive property, we would support:
For example:
edc.datasource.default.url.alias
would contain the vault secret keyedc.datasource.default.url
would serve as a direct configuration fallbackMight not cover all possible use cases, but it would provide a consistent scheme for most scenarios.
Thank you.
Beta Was this translation helpful? Give feedback.
All reactions