Skip to content

Conversation

mlanett
Copy link

@mlanett mlanett commented Oct 2, 2025

Let us improve the use cases to support inheritance of secrets. For example:

  • defaults/myservice/…
  • staging/myservice/…
  • production/myservice/…

At startup time, a service loads its secrets using chamber with multiple paths, e.g. chamber exec defaults/myservice staging/myservice -- …. This leads to many warnings of overwritten variables. However we are intentionally overwriting them, so the warnings do not reveal problems but instead pollute service logs. Thus we propose a flag --no-warn-conflicts to suppress these warnings.

@mlanett mlanett requested a review from a team as a code owner October 2, 2025 03:56
@mlanett mlanett force-pushed the add-no-warn-conflicts-flag--PR-1 branch from ef93859 to c3f9137 Compare October 2, 2025 04:06
When loading secrets from multiple services, chamber will warn about environment
variables that get overwritten. Use the `--no-warn-conflicts` flag to suppress
these warnings when conflicts are expected:

    chamber exec --no-warn-conflicts defaults/app production/app -- <your executable>

Add tests to verify the storage systems handle invalid AWS_PROFILE variables.
Fix tests which don't handle invalid profiles.
@mlanett mlanett force-pushed the add-no-warn-conflicts-flag--PR-1 branch from c3f9137 to d3af627 Compare October 2, 2025 04:07
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant