Skip to content

Enabling the use of secrets during a deployment#330

Open
karrgov wants to merge 2 commits intocloudfoundry:masterfrom
karrgov:passing_secrets_during_deploy
Open

Enabling the use of secrets during a deployment#330
karrgov wants to merge 2 commits intocloudfoundry:masterfrom
karrgov:passing_secrets_during_deploy

Conversation

@karrgov
Copy link

@karrgov karrgov commented Dec 19, 2025

LMCROSSITXSADEPLOY-2301

@karrgov karrgov force-pushed the passing_secrets_during_deploy branch from 67c51a0 to df93cc6 Compare February 2, 2026 19:02
Comment on lines +84 to +91

for(ExtensionDescriptor extensionDescriptor : localList) {
if(extensionDescriptor.getId().equals(Constants.SECURE_EXTENSION_DESCRIPTOR_ID)) {
this.secureExtensionDescriptor = extensionDescriptor;
}
}

for(ExtensionDescriptor extensionDescriptor : localList) {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I still do not get why this whole change in collect method is needed.
Isn't it enough just to ignore the secure extension descriptor here?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants