-
Notifications
You must be signed in to change notification settings - Fork 11
feat: add per-secret provider configuration with fallback chains #43
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
|
Claude finished @domenkozar's task —— View job PR Review Complete ✅This pull request adds per-secret provider configuration with fallback chains - a well-implemented feature with excellent test coverage. Todo List
Code Quality AnalysisCore Implementation (
|
Deploying with
|
| Status | Name | Latest Commit | Preview URL | Updated (UTC) |
|---|---|---|---|---|
| ✅ Deployment successful! View logs |
secretspec | da10512 | Commit Preview URL Branch Preview URL |
Nov 04 2025, 05:47 PM |
40177fb to
6df4b7b
Compare
Add support for configuring different providers for individual secrets, enabling fallback chains where secrets can be retrieved from multiple providers in order of preference. New features: - Per-secret `providers` field in configuration (list of provider aliases) - Provider alias management in global config (~/.config/secretspec/config.toml) - CLI commands to manage aliases: config provider add/remove/list - Fallback chain resolution for secure multi-provider setups This allows complex scenarios like: - Try OnePassword vault first, fall back to keyring - Different providers for different environments - Shared vs environment-specific provider locations Implementation includes: - New resolve_provider_aliases() method for alias → URI conversion - New get_secret_from_providers() for fallback chain resolution - Updated all secret operations (get, set, validate, import, run) - CLI provider alias management commands - Comprehensive unit and integration tests: * test_per_secret_provider_configuration * test_provider_alias_resolution * test_provider_alias_not_found * test_per_secret_provider_with_fallback_chain * test_get_secret_with_fallback_chain (new integration test) * test_validate_with_per_secret_providers (new integration test) * test_secret_config_merges_providers_from_default (new integration test) * test_cli_provider_alias_operations (new integration test) All tests pass (63 tests in secretspec, 19 in secretspec-derive). Fixes #10 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <[email protected]>
6df4b7b to
da10512
Compare
|
Claude finished @domenkozar's task —— View job PR Review Complete ✅ Todo List
Code Quality AnalysisCore Implementation (
|
Add support for configuring different providers for individual secrets, enabling fallback chains where secrets can be retrieved from multiple providers in order of preference.
New features:
providersfield in configuration (list of provider aliases)This allows complex scenarios like:
Implementation includes:
All tests pass (63 tests in secretspec, 19 in secretspec-derive).
Fixes #10
🤖 Generated with Claude Code