You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This example works as expected. However, the documentation is a bit misleading. It seems that cloak ignores labels like :default and :retired. Instead, it relies on the order of the cipher entries.
The only difference is the order of the entries. When we run mix cloak.migrate.ecto, the keys aren't rotated and remain V1. It seems the migration picks the first cipher entry.
Happy to provide more information if necessary. Thanks!
The text was updated successfully, but these errors were encountered:
@AndroidOatmeal You are correct. The order of the keys is important because I didn't think it was necessary to dictate the labels. I'll look things over and document this better.
Hi there. First off, thanks so much for the amazing library! It's been extremely useful for our business and maintaining security compliance.
I was looking at the documentation for the
mix cloak.migrate.ecto
task: https://hexdocs.pm/cloak_ecto/rotate_keys.html#contentIn the example, the docs say to simply change the labels for your keys and add a new
:default
entry:This example works as expected. However, the documentation is a bit misleading. It seems that
cloak
ignores labels like:default
and:retired
. Instead, it relies on the order of the cipher entries.For example, consider this configuration:
The only difference is the order of the entries. When we run
mix cloak.migrate.ecto
, the keys aren't rotated and remain V1. It seems the migration picks the first cipher entry.Happy to provide more information if necessary. Thanks!
The text was updated successfully, but these errors were encountered: