generated from TBD54566975/tbd-project-template
-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Replace ad-hoc envar "protocol" with something more structured #1240
Comments
Open
alecthomas
added
triage
Issue needs triaging
next
Work that will be be picked up next
labels
Apr 13, 2024
Just adding triage back to this one because someone needs to take this, so we should discuss next week. |
alecthomas
added
triage
Issue needs triaging
and removed
next
Work that will be be picked up next
labels
Apr 13, 2024
Stupid bot. |
|
That one is more related to pulling config/secrets from different sources in production - ie. a DB table for config, and AWS Secrets Manager for secrets. The plumbing is there in the config resolvers, we just need implementations for them. |
2 tasks
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Currently we utilise a random set of environment variables such as
FTL_CONFIG
,FTL_ENDPOINT
,LOG_LEVEL
, etc. to propagate configuration state between the runner and the module it is executing. We should come up with something less gross.One option would be to double down on using envars for this, but have a data structure that encapsulates it all. Another option would be to push some of this back to the Runner over gRPC. That is to read a config key or secret key, the user code calls a gRPC method on the Runner.
The text was updated successfully, but these errors were encountered: