Why This Exists
Ghostable keeps a strict zero-knowledge model: environment keys are never decrypted server-side. When a user links a new device (or gains access to an environment), that device cannot decrypt until an authorized teammate re-shares the environment key envelope. v2 now surfaces this as an explicit, auditable workflow instead of a silent failure.Recipient Experience
When your device is missing key access, Ghostable returns a machine-readableENV_KEY_RESHARE_REQUIRED state and shows a pending access message in clients.
- CLI:
env pull,env diff, andvar pulldisplay waiting guidance. - Desktop: environment variables show a dedicated Key Access Pending state.
- Web: you can see pending request rows in the organization key re-share queue.
Actor Experience (Who Can Fulfill)
Only users who canmanageSettings on the target environment can fulfill requests.
- Desktop: fulfill from the organization key re-share queue (one click).
- CLI fallback:
ghostable env reshare fulfill <request-id> is safe for email and runbooks because it requires only
the request id.
Troubleshooting
If a request is visible but cannot be fulfilled from your current machine:- The account may have permissions but this device lacks local key material.
- Use another authorized device that already has the environment key.
- Run
ghostable env reshare fulfill <request-id>from that device.
Audit Trail
Lifecycle events are recorded for each request:environment_key_reshare_requestedenvironment_key_reshare_notifiedenvironment_key_reshare_completedenvironment_key_reshare_cancelledenvironment_key_reshare_superseded