Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Make software.amazon.awssdk groupId owned by the AmazonServices #560

Merged
merged 1 commit into from
Jun 22, 2022

Conversation

aloubyansky
Copy link
Member

Make software.amazon.awssdk groupId owned by the AmazonServices to avoid a possibiliy for other members to override versions of these dependencies

FYI @ppalaga

Comment on lines -225 to -230
<exclusions>
<exclusion>
<groupId>commons-logging</groupId>
<artifactId>commons-logging</artifactId>
</exclusion>
</exclusions>
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Could you please add back the exclusions in the BOM generator config?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The way I decided to do it is to add an option that would allow each member to keep their own exclusions for common dependencies. While aligning the common dependency version is critical, I am not sure whether it's a good idea to allow one member to control exclusions for others, especially if that member didn't do a proper research on that. So I added this, probably, controversial option keepThirdpartyExclusions element to member config (which is true by default) that allows members to keep their exclusions configured in their original BOMs.
This could make the order of member BOM imports in Quarkus apps significant, although that'll probably be an edge case.
So in this particular change the exclusion from the quarkus-amazon-services BOM is removed but for this same constraint in the quarkus-camel-bom it is still present.
WDYT @ppalaga and @gsmet?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Not following why we wouldn't want alignment around exclusions be consistent across the platform ?

Users can add explicit exclusions/inclusions if they somehow need it for their usecase, right ?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I am not sure how to do that automatically so everyone is happy about that. If you have a suggestion, please share. We can configure agreed upon exclusions in the platform config today, it'd be a static config though that would need to be adjusted on changes to the member BOMs, which will be difficult to track.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Couldn't we have the tool apply all exclusions and fail platform build if items added that isn't in a agreed upon list ?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It wouldn't be much different from simply adding a common dependency constraint with exclusions for all the members, right? This can be done today in the platform config.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sorry, I am going to merge it, since I need to upgrade the platform generator for other reasons. Please create an issue if you think we could have a more appropriate default.

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@aloubyansky aloubyansky force-pushed the amazon-own-constraints branch from 170d936 to 64b8792 Compare June 22, 2022 07:14
…oid a possibiliy for other members to override versions of these dependencies
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants