Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

server k8s common module #2632

Merged
merged 4 commits into from
May 31, 2024
Merged

server k8s common module #2632

merged 4 commits into from
May 31, 2024

Conversation

abvaidya
Copy link
Collaborator

@abvaidya abvaidya commented May 30, 2024

Description

Contribution Checklist:

  • The pull request does not introduce any breaking changes
  • I have read the contribution guidelines.
  • Create an issue and link to the pull request.

Attach Screenshots (Optional)

@abvaidya abvaidya force-pushed the server-k8s-common branch 2 times, most recently from efd4d76 to 902fd89 Compare May 30, 2024 15:32
Copy link
Collaborator

@havetisyan havetisyan left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Also I don't see the changes in the server side utilizing the new api

* @return secret for the given key and application as char[]
*/
default char[] getSecret(String appName, String keygroupName, String keyName) {
return keyName.toCharArray();
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this should be set to getSecret(appName, null, keyName); to main backward compatibility and not break anyone before they get a chance to update their code.

@havetisyan havetisyan merged commit 452827d into master May 31, 2024
6 checks passed
@havetisyan havetisyan deleted the server-k8s-common branch May 31, 2024 14:09
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants