Svb Config Site
# svb_config/production.py from .base import * SECRET_KEY = os.environ["DJANGO_SECRET_KEY"] DEBUG = False ALLOWED_HOSTS = os.environ.get("ALLOWED_HOSTS", "").split(",") For SVB config in high-security mode, we require all bank creds if not SVB_CLIENT_ID or not SVB_CLIENT_SECRET: raise ValueError("SVB_CLIENT_ID and SVB_CLIENT_SECRET must be set in production")
class Config: env_file = ".env" validate_assignment = True config = SVBConfig() In a post-SVB-crisis world, many banks require regional failover. An advanced SVB config supports a list of endpoints: svb config
# svb_config/base.py import os from pathlib import Path BASE_DIR = Path( file ).resolve().parent.parent Security - these MUST be overridden in environment-specific configs SECRET_KEY = os.environ.get("DJANGO_SECRET_KEY", "dev-only-insecure") DEBUG = False # Never default to True in base SVB-specific service bindings - the "B" in SVB SVB_API_URL = os.environ.get("SVB_API_URL", "https://api.svb.com/v1") SVB_CLIENT_ID = os.environ.get("SVB_CLIENT_ID") SVB_CLIENT_SECRET = os.environ.get("SVB_CLIENT_SECRET") Database - note how credentials are absent from hard-coded strings DATABASES = { "default": { "ENGINE": "django.db.backends.postgresql", "NAME": os.environ.get("DB_NAME"), "USER": os.environ.get("DB_USER"), "PASSWORD": os.environ.get("DB_PASSWORD"), "HOST": os.environ.get("DB_HOST"), "PORT": os.environ.get("DB_PORT", "5432"), } } Feature flags (Variables) FEATURE_NEW_ONBOARDING = False FEATURE_BANK_API_V2 = os.environ.get("FEATURE_BANK_API_V2", "False") == "True" Step 3: Environment-Specific Overrides production.py – Strict, no defaults. # svb_config/production
# Example of circuit-breaker ready config SVB_PRIMARY_REGION = os.environ.get("SVB_PRIMARY_REGION", "us-east-1") SVB_FAILOVER_REGIONS = os.environ.get("SVB_FAILOVER_REGIONS", "us-west-2,eu-west-1").split(",") Pitfall 1: Storing Config in the Code Repository Fix: Use .env files ( .gitignore -ed) or a secrets manager. For Docker/K8s, use Secrets objects. Pitfall 2: Not Validating Early Fix: Add a health check endpoint that verifies critical SVB config keys are populated. For Docker/K8s, use Secrets objects
export SVB_ENV=production export DJANGO_SETTINGS_MODULE=svb_config python manage.py runserver 1. Secret Rotation Without Downtime A sophisticated SVB config integrates with HashiCorp Vault or AWS Secrets Manager. Instead of environment variables, you call a secret store at boot:
project/ ├── svb_config/ │ ├── __init__.py │ ├── base.py # Defaults (all environments) │ ├── development.py # Local dev overrides │ ├── staging.py # Staging-specific │ ├── production.py # Production (secrets come from env vars) │ └── validators.py # Custom validation rules ├── .env.template └── manage.py The base.py file contains everything that does not change between environments. Notice how sensitive values are left as placeholders.