-
Notifications
You must be signed in to change notification settings - Fork 447
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
If a key is undecryptable, rename it, log it, regnerate it #2072
Comments
Chat with @fabiocav to get more specifics on how this should work. |
and btw, this is just my proposal for how things could be. There are other options that I remember @fabiocav suggesting as well; for example write more metadata into the secrets that would tell you what happened. Regardless, the only way to get out of this situation currently is manual (delete all secrets in your storage account or in your file system depending on what an app setting says), and there should be a better way. |
Can you explain exactly the workaround you mentioned above? I'm in this situation and don't really want to recreate the function app. -thanks |
@ericleigh007 Try this:
If that doesn't work: |
Had a quick chat with @alrod and we'll start this simple by following an approach similar to what @ahmelsayed suggested: If we are unable to decrypt the payload:
NOTE: We may need to specially consider scenarios where multiple sites are mistakenly setup with the same share, as this may lead to a situation where the sites keep correcting each other's secrets, initiating a loop. So we may need to limit the number of times we take this action. |
The runtime today fails with 500 when keys are not decryptable and the user needs to manually go and clean them up.
It'll be much better if for example
<name>.json
to<name>.json.undecryptable
The text was updated successfully, but these errors were encountered: