-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Destination S3 / S3 Data Lake: use micronaut injection instead of System.getenv for assume role #51618
base: edgao/micronaut_initial_cleanup
Are you sure you want to change the base?
Destination S3 / S3 Data Lake: use micronaut injection instead of System.getenv for assume role #51618
Conversation
The latest updates on your projects. Learn more about Vercel for Git ↗︎
|
8bbbf2d
to
81dd6cc
Compare
13b1d37
to
a5f28ae
Compare
a5f28ae
to
b726430
Compare
b726430
to
628c99b
Compare
7cfcceb
to
ebce44e
Compare
628c99b
to
8a5a199
Compare
...-cdk/bulk/core/load/src/testFixtures/kotlin/io/airbyte/cdk/load/test/util/IntegrationTest.kt
Show resolved
Hide resolved
airbyte-cdk/bulk/toolkits/load-s3/src/main/kotlin/io/airbyte/cdk/load/file/s3/S3Client.kt
Show resolved
Hide resolved
This is great, Thanks! Anyway we could write some sort of documentation about what the process should be if want to add new properties to be used in our code? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
One thing to potentially consider is using a masking pattern like Micronaut supports here (https://docs.micronaut.io/latest/guide/#environmentEndpoint) instead of relying a comment to ensure that secrets are printed. Instead of passing a list/map of String around, we could potentially wrap each env var in an object whose toString implements the masking logic you can see in something like EnvironmentEndpoint
or EnvironmentFilterSpecification
. Definitely something that could be done separate from this if we are really concerned about it.
probably yeah. lemme post in the team slack and see if we have a typical process for this, it doesn't seem like a good fit for random code comments
the problem is that at the end, we still have to render it down to (for now I'll just override the toString on AwsAssumeRoleCredentials to nothing 🤷 ) |
rebased on #51600.
recommend reviewing by commit:
toolkit-load-aws
dependency, can we enable theaws
environment?)aws
environment; add application-aws to inject the assume role creds; wire everything togetherfuture PRs:
deployment: mode:
thing in its application.yaml