-
Notifications
You must be signed in to change notification settings - Fork 10
Open
Description
When credentials_obfuscation_svc
crashes and restarted with a fresh state it will have the initial pending-secret. If no caller calls set_secret
again (and how would the caller knew it should) it will stay in this state going forward. It can result in:
- from this point on no data encrypted before the crash can be decrypted
- exposing this bug Convert strings to binaries even if disabled or secret pending #17
What if the secret (and probably other state as well) would be stored in persistent_term. encrypt/decrypt could be executed in the calling process, the gen_server is only kept for serialising state updates?
This would also prevent the secrets being logged at gen_server crash. Would this hurt observability?
Any feedback is appreciated.
Metadata
Metadata
Assignees
Labels
No labels