-
Notifications
You must be signed in to change notification settings - Fork 27
Configuration endpoint #56
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Do we have any data on usage of these endpoints? Do we understand the (perceived or actual) benefit to devs and ops of the endpoints? |
Could be useful, would want to
What would this look like?
Definitely would be useful from a scanning and testing perspective e.g. should be accessible, should require VPN, SSO, etc. Could also be project or server level tags.
Haven't heard of this. In general, it'd be good to have apps report more of their behavior assuming implementation cost is low and it doesn't expose anything sensitive. |
This feels dangerous, as lots of secrets are in env variables. We may want to consider recommending implementation similar to Apache Airflow where certain key patterns are "un viewable". |
Right, we probably don't want to grab everything by default, but instead recommend a standard way to expose configuration should that be needed, and warn about exposing secrets. |
In a few cases, we have implemented endpoints that expose the configuration of a running app. I think it would be useful to standardize how to do that, and document it as optional.
A few considerations:
environment
key ?configuration
key ?__config__
endpoint?The text was updated successfully, but these errors were encountered: