Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[WIP] Autoseal: Automatically upgrade stored keys when seal keys are upgraded #5764

Closed
wants to merge 1 commit into from

Conversation

chrishoffman
Copy link
Contributor

@chrishoffman chrishoffman commented Nov 12, 2018

I tested this manually with Azure including PR #5757.

@chrishoffman chrishoffman added this to the 1.0 milestone Nov 12, 2018
d.core.logger.Info("autoseal: upgrading stored keys")
if err := d.SetStoredKeys(ctx, keys); err != nil {
return nil, errwrap.Wrapf("failed to upgrade stored keys: {{err}}", err)
}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These upgrades should be happening only on the active node

@chrishoffman chrishoffman changed the title Autoseal: Automatically upgrade stored keys when seal keys are upgraded [WIP] Autoseal: Automatically upgrade stored keys when seal keys are upgraded Nov 12, 2018
@briankassouf briankassouf modified the milestones: 1.0, 1.1 Nov 20, 2018
@briankassouf briankassouf modified the milestones: 1.1, 1.1.1 Mar 1, 2019
@jefferai jefferai modified the milestones: 1.1.1, 1.1.2 Apr 10, 2019
@briankassouf briankassouf modified the milestones: 1.1.2, 1.1.3 Apr 29, 2019
@briankassouf briankassouf modified the milestones: 1.1.3, 1.2 May 21, 2019
@jefferai jefferai modified the milestones: 1.2, 1.3 Jul 2, 2019
@ncabatoff
Copy link
Collaborator

This has been addressed via #7493.

@ncabatoff ncabatoff closed this Oct 15, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants