markap14 commented on pull request #5391:
URL: https://github.com/apache/nifi/pull/5391#issuecomment-931391414


   Actually @gresockj after playing with the AWS Secrets Manager a bit more, 
I'm wondering if we should actually go a slightly different route here. Rather 
than having the value of a secret be a 'plaintext' value, perhaps it makes more 
sense to use the key/value pairs that the UI is tailored to?
   
   So then, instead of treating each secret as a separate parameter, we would 
treat each AWS Secret like a Parameter Context. And each parameter would then 
map to one of those key/value pairs. Then users can just go into AWS Secrets 
Manager, create a new Secret, and enter all of their parameters that they care 
about. Then the provider would be configured with a mapping of ParameterContext 
Name to Secret Name, with a default Secret Name to be used if there is no 
mapping.
   
   For example, if my flow has ContextA and ContextB, I could configure the 
Provider so that ContextA maps to secret SecretA and ContextB maps to SecretB. 
Or I could configure it so that ContextA maps to SecretA and ContextB maps to 
SecretA. Or configure it so that ContextA maps to SecretA and not provide a 
mapping for ContextB, just specifying SecretA as the default secret name.
   
   Thoughts on this approach?


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]


Reply via email to