-
Notifications
You must be signed in to change notification settings - Fork 1
Open
Description
Description
There is inconsistent behavior between sc secrets reveal and sc secrets disallow.
- Running
sc secrets revealshows nothing (no output / no revealed secrets shown). - Running
sc secrets disallow "<key>"does show changes in secrets (as if it detected something to update). - If I accept/apply those changes, the SSH key still is not removed.
This makes it unclear what the real secrets state is and prevents removing an allowed SSH key reliably.
Steps to Reproduce
-
Run:
sc secrets reveal
Observed: no output / nothing displayed.
-
Attempt to remove an SSH key:
sc secrets disallow "<key>"Observed: tool shows changes in secrets (diff / pending changes).
-
Accept/apply the changes.
-
Check secrets / allowed keys again (via
sc secrets revealor expected state).
Observed: key is still present / not removed.
Expected Behavior
sc secrets revealshould clearly display current secrets / allowed keys state (or at least confirm what is revealed and where).sc secrets disallow "<key>"should reliably remove the specified key and persist the change.- If
disallowshows a diff and the user accepts it, the result should match the diff (idempotent + correct).
Actual Behavior
revealprints nothing.disallowindicates changes but does not actually remove the key after applying.
Impact
- Users cannot confidently inspect secrets state.
- SSH key removal is broken / unreliable.
- Risk of stuck access permissions or incorrect secrets management.
Notes / Suspicions
revealmight be failing silently or writing to a location not reflected in the CLI output.disallowmight be generating a diff against a different secrets state than what is actually applied (state sync issue).- Related to the earlier issue where
allow/disallowmay require an implicitrevealto operate on latest secrets.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels