Ignore encryption selection options for binary store (and warn when they are used) #1927
+71
−6
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
It happened more than once that someone "encrypted" a file using the binary store, which resulted in simply base64 encoding the source since encryption was essentially disabled since some encryption selection option prevented the
data
key to be encrypted.This PR allows to identify input stores that yield a single key (without comments), and disables all selection options in this case. It also prints warnings for options that potentially disable encryption.
Regarding the warnings: we could also simply not print any warning (might be less annoying to users who simply want to use the same config everywhere), or make the warnings more specific (if they match the
data
key; for that we need to provide the key name as well). @getsops/maintainers what do you think?Fixes #1822.