Skip to content

Adding a new flag to the deploy command and the related new functionality in order to support the collecting of secrets and sending them to the backend#252

Open
karrgov wants to merge 4 commits intocloudfoundry:masterfrom
karrgov:passing_secrets_during_deployment_new
Open

Adding a new flag to the deploy command and the related new functionality in order to support the collecting of secrets and sending them to the backend#252
karrgov wants to merge 4 commits intocloudfoundry:masterfrom
karrgov:passing_secrets_during_deployment_new

Conversation

@karrgov
Copy link
Contributor

@karrgov karrgov commented Dec 19, 2025

LMCROSSITXSADEPLOY-2301


var jsonObject map[string]interface{}

err2 := json.Unmarshal([]byte(envValue), &jsonObject)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

can you reuse err?

Copy link
Contributor Author

@karrgov karrgov Jan 22, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I know that reusing the same err is not recommended- I will just change the names and make them more descriptive instead of a plain err2 :)

Type typeOfValue
StringContent string
JSONContent interface{}
//ObjectContent map[string]interface{}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Remove this comment if not needed.

}
}

func TestCollectFromEnvWhenDuplciateNames(t *testing.T) {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Fix typo

"encryptionKey": encryptionKey,
"keyId": keyID,
}
jsonBody, _ := json.Marshal(upsCredentials)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why is the error from json.Marshal ignored here?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for the suggestion :)

…lity in order to support the collecting of secrets and sending them to the backend

LMCROSSITXSADEPLOY-2301
LMCROSSITXSADEPLOY-2301
LMCROSSITXSADEPLOY-2301
@karrgov karrgov force-pushed the passing_secrets_during_deployment_new branch from 77d8ac3 to 8922dd2 Compare February 2, 2026 18:40
upsCredentials := map[string]string{
"encryptionKey": encryptionKey,
}
jsonBody, _ := json.Marshal(upsCredentials)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

handle exception here

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants