-
Notifications
You must be signed in to change notification settings - Fork 39
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
--cert-restart-on-secret-refresh not possible when not using different flag parsing framework #19
Comments
What happens if we give the option to set this option when you're starting up the rotator? That way, if you never call |
@adrianludwin that would be fine for me. So we add the option to the
I can make a PR for this :) |
Yup that lgtm (looks good to me)! Note that I'm not an owner of this project but I suspect that @maxsmythe , @ritazh etc would be happy with this as well. |
Not sure I like the idea of mixing the two. Users who do use the standard flag parser may accidentally also set the config option, which would negate the config. How do people feel about...
Projects using this would then be able to just implement their flag individually should they want to keep it. I'm not sure how many consumers of this project there are, but hopefully the semver stuff will give them enough warning to avoid surprise. |
+100 to semver. I kind of liked "batteries included" but I guess that does
make it a bit worse as a library, so I could live with that!
…On Thu, Jan 14, 2021 at 4:27 PM Max Smythe ***@***.***> wrote:
Not sure I like the idea of mixing the two. Users who do use the standard
flag parser may accidentally also set the config option, which would negate
the config.
How do people feel about...
1. Starting tagging commits with semver so that we can track
non-backwards-compatible changes
2. Removing the flag and implementing a config option, incrementing
this semver
Projects using this would then be able to just implement their flag
individually should they want to keep it.
I'm not sure how many consumers of this project there are, but hopefully
the semver stuff will give them enough warning to avoid surprise.
@ritazh <https://github.com/ritazh> @shomron <https://github.com/shomron>
thoughts?
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#19 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AE43PZDV4PXMZ4LR7I6S66LSZ5OVRANCNFSM4WAQGP3Q>
.
|
Yeah, working with some of these other libraries that use flags... the batteries included approach works great until you need to change the shape of the batteries :p |
sgtm
…On Thu, Jan 14, 2021 at 8:45 PM Max Smythe ***@***.***> wrote:
Yeah, working with some of these other libraries that use flags... the
batteries included approach works great until you need to change the shape
of the batteries :p
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#19 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AE43PZAC6MGS7RD4V47BCUDSZ6M2FANCNFSM4WAQGP3Q>
.
|
I would be all for doing semver and making this a breaking change in a major release or something similar :) |
+1 on semver and start cutting releases for this project. It would make introducing breaking changes much easier. |
@ritazh , @maxsmythe - what do we need to do to make this happen? I'm not an admin on this repo so I can't create a release myself. Can we just call what we currently have "v0.1.0" and then start working towards v0.2.0? |
Since we don't have CI to automate releases yet until #14 is done, I could manually create/push a tag with the latest commit in master. This should also help unblock #18 WDYT @maxsmythe? |
SGTM |
Sorry for the delay. |
I made a PR for making this option part of the CertRotator struct: #23 |
Thanks! |
I use a different flag framework to parse flags, and would like this to be a configuration option you pass to the rotator when starting up. However this might be a breaking change for other users. How do you feel about changing this?
The text was updated successfully, but these errors were encountered: