-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Improve SmallRye Config Secret Keys Handlers documentation in config reference #32330
Comments
/cc @Ladicek (smallrye), @jmartisk (smallrye), @phillip-kruger (smallrye), @radcortez (smallrye) |
@radcortez any plans on this before .Final? |
I'll have a look. |
@michalvavrik Would you mind to show an example of a workable sample of how to use this? I tried with the following but it does not seem to decrypt the secret.
The above values are generated using the following script:
In the application, the retrieved value is not decoded but shows the following when I printed:
Output:
I am using Quarkus platform What do I miss? |
@chengkuangan can you reconfirm the Quarkus version? Because Secret Key Handlers were only added in Quarkus 3.0.0: #31824 https://github.com/smallrye/smallrye-config/releases/tag/3.2.0 |
@radcortez You are right. Updated to latest Quarkus version and it works. tqvm |
Description
SmallRye Config Secret Keys Handler is important feature several products are going to use as part of Quarkus. Quarkus Configuration reference shows short example and points SmallRye Config Secret Keys documentation. This is highly opinionated, but as I was getting familiar, these are information I was missing in Quarkus docs (or in SmallRye Config docs and linked with note from Quarkus docs):
aes-gcm-nopadding
, however examples doesn't contain note that there issmallrye.config.secret-handler.aes-gcm-nopadding.encryption-key
that needs to be set in order for them to work. I realize build fails if it is not and SmallRye contains docs with description of this property, but I would like to make it easier for users. Just set in in the example too.aes-gcm-nopadding
handler only accepts AES 128 (not 256) which should be documentedaes-gcm-nopadding
secret and encryption key (without padding) must be base 64 encoded, which should be documentedImplementation ideas
No response
The text was updated successfully, but these errors were encountered: