You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
feat(basilica): opt-in admin key rotation after bootstrap (#238)
Add `rotate_admin_key()` primitive + `rotate_admin_after_bootstrap`
TenantSpec field (default off) so callers can invalidate the bootstrap
admin key as soon as `provision()` returns. Wire it through the CLI as
the `rotate-admin-key` subcommand and the tenant-lifecycle workflow as a
new `action` choice. The workflow `::add-mask::`s `admin_key` before any
`cat result.json` line, same pattern as the existing `api_key` mask.
Mechanism: the Basilica SDK exposes no env-patch primitive
(create/delete/restart only). Rotation therefore deletes the existing
proxy UUID and creates a fresh one with the rotated env. As a
consequence, `proxy_instance_id` and `proxy.url` change; the result
JSON returns the post-rotation values which the caller must persist.
Trade-off: opt-in because the rotation adds one proxy re-roll (~30s)
to provisioning time. Recommended for production tenants where the
bootstrap admin key must be invalidated; safe to leave off for dev /
sandbox tenants.
Tests: 9 unit tests under deployments/basilica/tests/ exercising the
rotation logic with the Basilica SDK HTTP boundary mocked
(create_deployment / delete_deployment / get_deployment). Rotation
logic itself runs unmodified.
0 commit comments