Details
-
Improvement
-
Status: Closed (View Workflow)
-
Minor
-
Resolution: Fixed
-
None
-
-
0.1.0
Description
Hello!
I've created a [fork|https://github.com/Quaiks/aws-secrets-manager-credentials-provider-plugin] and I am adding new type of credentials.
The principle is simple: add a tag in AWS with the secret type and store a JSON as value. I am looking for some feedback of the implementation. Right now only happy paths are implemented but I would like to know if I am following the proper path.
Thanks in advance!
Attachments
Issue Links
Activity
Field | Original Value | New Value |
---|---|---|
Description |
Hello! I've created a [fork|[https://github.com/Quaiks/aws-secrets-manager-credentials-provider-plugin]] and I am adding new type of credentials. The principle is simple: add a tag in AWS with the secret type and store a JSON as value. I am looking for some feedback of the implementation. Right now only happy paths are implemented but I would like to know if I am following the proper path. Thanks in advance! |
Hello! I've created a [fork|[https://github.com/Quaiks/aws-secrets-manager-credentials-provider-plugin]] and I am adding new type of credentials. The principle is simple: add a tag in AWS with the secret type and store a JSON as value. I am looking for some feedback of the implementation. Right now only happy paths are implemented but I would like to know if I am following the proper path. Thanks in advance! |
Status | Open [ 1 ] | In Progress [ 3 ] |
Assignee | Enrique Fernández-Polo [ quaiks ] | Chris Kilding [ chriskilding ] |
Remote Link | This issue links to "GitHub PR with finished implementation (Web Link)" [ 23943 ] |
Released As | 0.1.0 | |
Resolution | Fixed [ 1 ] | |
Status | In Progress [ 3 ] | Resolved [ 5 ] |
Status | Resolved [ 5 ] | Closed [ 6 ] |
Hi Enrique,
This is a feature I’ve been musing on for a little while. As I see it, there’s a few different solutions possible.
I initially developed the plugin with just the Secret Text credential Type for the following reasons:
Point 4 is probably the strongest reason not to support multiple credential types in the AWS Secrets Manager provider. If we invent a Jenkins-proprietary schema for complex credential types eg SSH key (username, key, passphrase (optional)), only Jenkins will understand it, and we’ll have to either duplicate that credential for our other applications, or update them all to understand the Jenkins credential schema.
However... this is a tricky architectural problem. There’s probably not a single perfect answer to it. I’d be interested to hear other views on this