fides
fides copied to clipboard
fix: seed security defaults during init
Summary
- Closes #5075
- auto-generate the security app encryption key and root client credentials when
fides initruns so fresh configs boot without manual edits - backfill these credentials if an existing config still contains legacy empty defaults
- add control-plane tests to cover newly generated values and the backfill path
Testing
- nox -s pytest -- ctl-unit
Manual Verification
- Ensure Docker Desktop is running and copy
example.envto.envif needed. - Start the dev stack via nox and open a shell in the API container:
nox -s dev -- shell. - Inside the container, create a clean workspace and run init:
rm -rf /tmp/init-defaults && mkdir -p /tmp/init-defaults && cd /tmp/init-defaultsfides init(press Enter to decline analytics when prompted)grep app_encryption_key .fides/fides.tomlgrep oauth_root_client_id .fides/fides.tomlgrep oauth_root_client_secret .fides/fides.tomlEach command should show a non-empty value.
- Simulate upgrading an older config with empty credentials:
printf '[security]\napp_encryption_key = "" # string\noauth_root_client_id = "" # string\noauth_root_client_secret = "" # string\n' > .fides/fides.tomlfides init(again answer the analytics prompt)- Re-run the three
grepcommands to confirm the blanks were replaced.
- Exit the shell (
exit) and stop the stack:nox -s teardown -- volumes.
Someone is attempting to deploy a commit to the Ethyca Team on Vercel.
A member of the Team first needs to authorize it.
The latest updates on your projects. Learn more about Vercel for GitHub.
1 Skipped Deployment
| Project | Deployment | Preview | Comments | Updated (UTC) |
|---|---|---|---|---|
| fides-privacy-center | Sep 24, 2025 1:14am |