If I understood what Thomas wrote here correctly, Fly might even get rid of the digests (authenticator tag as Thomas puts it) altogether. So, it is no surprise they’ve moved away from MD5 (which may not be the best choice for a digest, anyway).
Yes, it’s keyed, not based on MD5, and deliberately collide-able now (these are checksums of secrets, not authenticators of secrets). But also, it’s true, we’re likely to get rid of this feature altogether; we have a better plan for how to handle this that doesn’t require our API server to have access even to a checksum of the secret.
My deployments to fly are now failing because the API aborts with an error if secrets aren’t changed, but the checksum is no longer based on MD5 (so my code that avoids setting them is now broken). What’s the recommended way to “ensure” a secret is set to what it needs to be set to?
Can I ask the API not to error if the secrets are already correct?
I would like to be able to know if secrets have changed, prior to running the setSecrets mutation. It automatically re-deploys a new version on the app when changes are detected.