-
Hi there! If I understand the token correctly, it is meant to be acquired once per application and thereafter will indicate ownership over all queues created by it. For me, that leads to a significant question about automation: In a CI/CD and IaC (terraform) environment: who acquires it? So far I tried these approaches:
While I might be able to hack sth. around terraform to not update the token every time, my feeling is, that I don't really understand what the purpose of the Wouldn't the symmetrical encryption already ensure ownership? Is the correct combination of Am I overseeing something? Would it be an option to provide a way to |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 5 replies
-
The specific semantics of acquiring a The correct combination of The intended way of acquiring a Quirrel token is to do it once by hand, and then store it in some config (e.g. env variables). Can you elaborate on the need for doing this automatically? |
Beta Was this translation helpful? Give feedback.
The specific semantics of acquiring a
QUIRREL_TOKEN
is indeed a leftover from multi-tenacy. But also without multi-tenacy,QUIRREL_TOKEN
is required for authentication between Quirrel server and your application, since at least the application needs to be reachable via the public internet.The correct combination of
QUIRREL_BASE_URL
andQUIRREL_ENCRYPTION_SECRET
is indeed not enough, sinceQUIRREL_ENCRYPTION_SECRET
is only for client-side encryption of job payloads. If there was no added security, then a malicious actor that discoveredQUIRREL_BASE_URL
(which is easy to discover, given it's the url of your application) would be able to e.g. delete all queued jobs.The intended way of acqu…