adutra opened a new issue, #801: URL: https://github.com/apache/polaris/issues/801
### Describe the bug When bootstrapping a realm, either with the env var `POLARIS_BOOTSTRAP_CREDENTIALS` or using the admin tool, the provided secrets get rotated. Because previous secrets are still valid, this works, but I would argue that that's a bad user experience: the user said they want secret A, and they get secret B, and it's B that gets printed to stdout (for in-memory metastores). What is the reason for doing this rotation? * If the secrets were randomly generated, rotating is meaningless * If the secrets were provided by the user, rotating effectively overrides their instructions. ### To Reproduce _No response_ ### Actual Behavior _No response_ ### Expected Behavior _No response_ ### Additional context _No response_ ### System information _No response_ -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: issues-unsubscr...@polaris.apache.org.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org