-
Notifications
You must be signed in to change notification settings - Fork 243
Local CLI : can't insert a secret in order to obtain key_id to be used with fdw #3385
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
I think this error is related to the recent PostgreSQL upgrade and the removal of the "pgsodium" extension. I settled on the following workaround based on the original doc's suggestion. ./supabase/config.toml
./supabase/.env ./supabase/seed/1-seed.sql:
./supabase/seed/2-seed.sql:
|
Yup using config.toml is preferred here since you probably don't want MySQL password to be stored in a migration file. I will update docs accordingly. |
I must admit it's unclear to me how to inject secrets into the vault in a self hosted setup via docker compose and environment variables. Which is partially due to the unclear existence of config.toml which appears to be CLI only, while the ENV variables for the compose setup aren't really documented. Can I just do
and that appears in vault? can it be that easy? We want to bootstrap these secrets and the common way I'm used to is via env variables, e.g. injected from k8s secrets or via GCP secrets manager or whatever infra layer you're based on. Anything that can be automated and does not require logging into the UI and "running the SQL" from the dashbaord |
You can actually use the CLI to migrate your self-hosted database via
Under the hood, CLI essentially runs the sql functions exposed by vault to create or update secrets declared in |
Describe the bug
this example SQL , from Supabase docs https://supabase.com/docs/guides/database/extensions/wrappers/mssql
fails when executed in fresh environment instantiated using local CLI:
insert into vault.secrets (name, secret) values ( 'mssql', 'Server=localhost,1433;User=sa;Password=my_password;Database=master;IntegratedSecurity=false;TrustServerCertificate=true;encrypt=DANGER_PLAINTEXT;ApplicationName=wrappers' ) returning key_id;
Error: [42501] ERROR: permission denied for function _crypto_aead_det_noncegen
To Reproduce
Steps to reproduce the behavior:
Expected behavior
It used to work , but unfortunately I don't know which version broke it.
Screenshots
N/A
System information
Additional context
The text was updated successfully, but these errors were encountered: