Hi Georg,

Thanks for the feedback!

On Mon, 29 Jul 2019 at 19:10, Georg Henzler <ghenz...@apache.org> wrote:

> Hi David,
>
> great to see this moving forward! Here are a few comments from my side:
>
> * I'm not sure if $[env:name] is the best syntax... I suppose you chose
> that over curly braces to not clash with potential other replacement
> mechanisms downstream. But $[] looks fairly similar to ${}, maybe
> something like %env:name%, %{env:name} or #{env:name} would make it
> visually clearer that it is not a ${} replacement.
>

I guess it would be an idea to make these configurable, however I'm not yet
fully convinced that it would really add much value. Is there a specific
thing you can't do or do you just want to make it look different?


> * It looks like there is no way to escape for the case $[env:name]
> should be treated as literal at the moment - e.g. something like
> \$[env:name] should be possible IMHO
>

Right yes, it should be possible to escape. Best thing would be to file a
bug for this. There is now a JIRA component for the plugin:
https://issues.apache.org/jira/projects/FELIX/versions/12345963


> * I think it's good to use the 'secret' prefix ala $[secret:name]
> generically, but we should also (at least potentially) allow for secret
> stores other than Kubernetes (as described in [1]). I think changing the
> property name org.apache.felix.configadmin.plugin.interpolation.dir [2]
> to org.apache.felix.configadmin.plugin.interpolation.k8sSecretsDir (or
> similar) would be good to clearly indicate the expected directory
> structure as referenced by this property.
>

The $[secret:name] lookup doesn't actually do anything that is k8s specific
in itself. K8s just puts the secrets in plain files: the name of the file
is the key and the entire content of the file is the secret value. That
pattern could also be used in a non-k8s context. Maybe we can rename the
property name to
'org.apache.felix.configadmin.plugin.interpolation.secretdir' or something
like that?
OTOH the plugin could definitely be extended to support other types of
secrets or config values coming out of files. I guess it would be good to
create JIRAs for these if you see the need.

Kind regards,

David

Reply via email to