You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In #1019, we're looking at making it easy and fun to run simple aggregations with Divvi Up with a few command line invocations. One rough edge we have is collector credential handling. We instruct users to do divviup collector-credential generate --save, which will write out something like ./collector-credential-11.json, and then subsequently that same path is passed to divviup api-client collect --collector-credential-file.
It'd be nice if we instead defaulted to storing credentials in files under ~/.divviup/ (or whatever $HOME is on a given OS), akin to how aws-cli will store authentication tokens and config for which token goes with which account in ~/.aws/{config,credentials}.
This could break compatibility with the tool's existing interface (where --save writes the credential to $PWD) but I think there are probably few enough users of this tool out there that we can afford to make incompatible changes.
The text was updated successfully, but these errors were encountered:
Consider that we expect collector credentials to be shared amongst a team. I think as long as we're transparent about where the collector credential is stored this shouldn't be too much of a problem.
This could break compatibility with the tool's existing interface (where --save writes the credential to $PWD) but I think there are probably few enough users of this tool out there that we can afford to make incompatible changes.
Yes, I don't have problems with rapidly making breaking changes until we find something that is nice and easy to use.
In #1019, we're looking at making it easy and fun to run simple aggregations with Divvi Up with a few command line invocations. One rough edge we have is collector credential handling. We instruct users to do
divviup collector-credential generate --save
, which will write out something like./collector-credential-11.json
, and then subsequently that same path is passed todivviup api-client collect --collector-credential-file
.It'd be nice if we instead defaulted to storing credentials in files under
~/.divviup/
(or whatever$HOME
is on a given OS), akin to howaws-cli
will store authentication tokens and config for which token goes with which account in~/.aws/{config,credentials}
.This could break compatibility with the tool's existing interface (where
--save
writes the credential to$PWD
) but I think there are probably few enough users of this tool out there that we can afford to make incompatible changes.The text was updated successfully, but these errors were encountered: