Ultimately, you have to supply at least one secret to the application at runtime, and then it can bootstrap its way to others if needed.
Ultimately, you have to supply at least one secret to the application at runtime, and then it can bootstrap its way to others if needed.