sparse-intern-71089
11/26/2023, 8:16 PMechoing-dinner-19531
11/27/2023, 9:18 AMmillions-train-91139
12/04/2023, 12:06 PMechoing-dinner-19531
12/04/2023, 12:50 PMechoing-dinner-19531
12/04/2023, 12:50 PMechoing-dinner-19531
12/04/2023, 12:51 PMmillions-train-91139
12/04/2023, 12:54 PMrotate
dictate the source of the passphrase?
TBH, I'm not even so sure how much passphrase rotation is really used in automated systems to care about breaking it.echoing-dinner-19531
12/04/2023, 12:56 PMechoing-dinner-19531
12/04/2023, 12:56 PMechoing-dinner-19531
12/04/2023, 12:57 PMmillions-train-91139
12/04/2023, 1:02 PMmillions-train-91139
12/04/2023, 1:03 PMconfig
being decoupled from state
(retrieved from history on config refresh
) but being encrypted by a secret provider stored in the state.
Seems like lots of things can go wrong here, since obviously config + state updates are not atomic.millions-train-91139
12/04/2023, 1:05 PMCheckpointV3
file, which now has an empty config sectionechoing-dinner-19531
12/04/2023, 2:21 PMI also think that the reason there are not many issues around this, is due to the fact this is mostly unused.Maybe, but might just be that most are just using this and it works fine. It's hard to tell given we don't have telemetry, so we have to generally be cautious.
Seems like lots of things can go wrong here, since obviously config + state updates are not atomic.Well this is why I said config secrets provider should take priority. config can change without a state update, but at least every state update would then consistently be using the provider set by config.
I think that probably the majority of users will not store secrets in configNah this is a bad assumption. Lots of users store secrets in config.
bit connected to my question about, should the last used config for some update should be storedMaybe... I need to look into this more. It is a bit of a confusing system that's grown over the years trying to keep compatibility with what already exists.