You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When bootstrapping a realm, either with the env var POLARIS_BOOTSTRAP_CREDENTIALS or using the admin tool, the provided secrets get rotated.
Because previous secrets are still valid, this works, but I would argue that that's a bad user experience: the user said they want secret A, and they get secret B, and it's B that gets printed to stdout (for in-memory metastores).
What is the reason for doing this rotation?
If the secrets were randomly generated, rotating is meaningless
If the secrets were provided by the user, rotating effectively overrides their instructions.
To Reproduce
No response
Actual Behavior
No response
Expected Behavior
No response
Additional context
No response
System information
No response
The text was updated successfully, but these errors were encountered:
Describe the bug
When bootstrapping a realm, either with the env var
POLARIS_BOOTSTRAP_CREDENTIALS
or using the admin tool, the provided secrets get rotated.Because previous secrets are still valid, this works, but I would argue that that's a bad user experience: the user said they want secret A, and they get secret B, and it's B that gets printed to stdout (for in-memory metastores).
What is the reason for doing this rotation?
To Reproduce
No response
Actual Behavior
No response
Expected Behavior
No response
Additional context
No response
System information
No response
The text was updated successfully, but these errors were encountered: