Skip to content
This repository has been archived by the owner on Jun 10, 2024. It is now read-only.

Namespaces for data #168

Merged
merged 32 commits into from
Jul 31, 2021
Merged

Namespaces for data #168

merged 32 commits into from
Jul 31, 2021

Conversation

eddiejaoude
Copy link
Member

closes #137

@Cahllagerfeld
Copy link
Member

I added new test for the 403-scenarios. I think its mergeable then (I'd say as breaking change)

providers: [KeyspaceService],
exports: [KeyspaceService],
})
export class AstraApiModule {}
Copy link
Member Author

@eddiejaoude eddiejaoude Jul 25, 2021

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Maybe this could be called Astra to match the folder structure, then if it clashes in the imports we could use an alias

e.g.

import { AstraService as AstraApiService } from '../astra/astra.service';

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

AstraModule already gets imported from my package, that's why I named it AstraApi but I think the alias should be no problem

// canActivate(ctx: ExecutionContext) {
// return super.canActivate(ctx);
// }
// }
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is this still needed?

@eddiejaoude
Copy link
Member Author

This looks amazing!! A few tiny comments. But really great work 💪 💥

@UseGuards(TokenGuard)
@ApiSecurity('token')
@ApiQuery({ name: 'keyspace', required: true })
getTokens(@Query('keyspace') keyspace: string) {
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think this should be part of the path. I can change it in my PR

required: true,
})
@HttpCode(204)
deleteClient(@Query() query) {
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think this should be part of the path, I can change it in my PR. What do you think?

@Cahllagerfeld
Copy link
Member

Is there something missing if we make the mentioned changes in the other PR?

@eddiejaoude
Copy link
Member Author

I think this is ready to go? any improvements we can make in the next PR

@eddiejaoude
Copy link
Member Author

I created the PR, so I cannot approve it 🤦‍♂️

Copy link
Member

@Cahllagerfeld Cahllagerfeld left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks great 💥
I'd merge it as a breaking change.

@Cahllagerfeld
Copy link
Member

Looks great 💥
I'd merge it as a breaking change.

@eddiejaoude
One thing just came to my mind. You need to update your K8s secret, with the Token-Signing-Secret before deploying. Otherwise the token-creation will fail.

@eddiejaoude
Copy link
Member Author

You need to update your K8s secret, with the Token-Signing-Secret before deploying

Oh good spot 👍 thank you, I will do it after dinner

@eddiejaoude
Copy link
Member Author

Creating the secret now on Kubernetes, but naming it JWT_SECRET so it is not confused with anything else - I will update the code afterwards

@eddiejaoude
Copy link
Member Author

JWT Secret added to Kubernetes 👇

Screenshot 2021-07-31 at 09 33 09

@eddiejaoude eddiejaoude merged commit 0f90839 into main Jul 31, 2021
@eddiejaoude eddiejaoude deleted the issue-137c branch July 31, 2021 09:19
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Using namespace for separate of data
2 participants