Back to bug 1975323
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Mudit Agarwal | 2021-06-23 14:48:45 UTC | CC | muagarwa, shan | |
| Assignee | tnielsen | shan | ||
| Doc Type | If docs needed, set a value | Known Issue | ||
| Flags | needinfo?(shan) | |||
| Mudit Agarwal | 2021-06-23 14:49:20 UTC | Blocks | 1921784 | |
| Sébastien Han | 2021-06-23 15:27:18 UTC | Doc Text | Key encryption keys are not deleted from Vault during cluster deletion when the Vault K/V Secret engine is version 2. Keys can still be deleted manually using the vault command. | |
| Flags | needinfo?(shan) | needinfo?(rgeorge) | ||
| Rachael | 2021-06-24 06:48:36 UTC | Flags | needinfo?(rgeorge) | |
| Sébastien Han | 2021-06-24 09:06:15 UTC | Status | NEW | ASSIGNED |
| Sébastien Han | 2021-06-24 13:20:35 UTC | Status | ASSIGNED | MODIFIED |
| Doc Text | Key encryption keys are not deleted from Vault during cluster deletion when the Vault K/V Secret engine is version 2. Keys can still be deleted manually using the vault command. | Key encryption keys *metadata* are not deleted from Vault during cluster deletion when the Vault K/V Secret engine is version 2. However, the Data part of the key is properly deleted. If this is causing inconvenience, the metadata can still be deleted manually using the vault command. |
||
| Sébastien Han | 2021-06-24 13:40:42 UTC | Status | MODIFIED | ASSIGNED |
| Sébastien Han | 2021-06-24 15:07:20 UTC | Doc Text | Key encryption keys *metadata* are not deleted from Vault during cluster deletion when the Vault K/V Secret engine is version 2. However, the Data part of the key is properly deleted. If this is causing inconvenience, the metadata can still be deleted manually using the vault command. | Key encryption keys *data* are soft-deleted from Vault during cluster deletion when the Vault K/V Secret engine is version 2. This means any version of the Key can be retrieved and so the deletion undone. The metadata is still visible so the key can be undeleted. If this is causing inconvenience, the key can still be deleted manually using the vault command with the "destroy" argument. |
| Sébastien Han | 2021-06-28 08:36:09 UTC | Link ID | Github libopenstorage/secrets/pull/55 | |
| Agil Antony | 2021-06-29 16:46:54 UTC | CC | agantony | |
| Flags | needinfo?(rgeorge) needinfo?(shan) | |||
| Rachael | 2021-06-30 05:14:32 UTC | Flags | needinfo?(rgeorge) | |
| Sébastien Han | 2021-06-30 09:44:28 UTC | Status | ASSIGNED | POST |
| Mudit Agarwal | 2021-07-05 11:18:44 UTC | Blocks | 1966894 | |
| Mudit Agarwal | 2021-07-05 11:30:45 UTC | Blocks | 1921784 | |
| Sébastien Han | 2021-07-09 09:09:08 UTC | Link ID | Github rook/rook/pull/8288 | |
| Sébastien Han | 2021-07-12 15:42:12 UTC | Status | POST | MODIFIED |
| Link ID | Github red-hat-data-services/rook/pull/7 | |||
| Olive Lakra | 2021-07-28 04:17:43 UTC | CC | olakra | |
| Doc Text | Key encryption keys *data* are soft-deleted from Vault during cluster deletion when the Vault K/V Secret engine is version 2. This means any version of the Key can be retrieved and so the deletion undone. The metadata is still visible so the key can be undeleted. If this is causing inconvenience, the key can still be deleted manually using the vault command with the "destroy" argument. | .Keys for OSDs in the Vault are not deleted during uninstall when `kv-v2` is used Key encryption keys *data* are soft-deleted from Vault during cluster deletion when the Vault K/V Secret engine is version 2. This means any version of the Key can be retrieved and so the deletion is undone. The metadata is still visible so the key can be restored. If this is causing inconvenience, the key can still be deleted manually using the vault command with the "destroy" argument. | ||
| Flags | needinfo?(muagarwa) | |||
| Mudit Agarwal | 2021-07-28 05:39:23 UTC | Flags | needinfo?(muagarwa) | |
| Mudit Agarwal | 2021-08-16 07:41:24 UTC | Blocks | 1993801 | |
| Mudit Agarwal | 2021-08-16 07:43:10 UTC | Doc Type | Known Issue | Bug Fix |
| Status | MODIFIED | ON_QA | ||
| Neha Berry | 2021-08-16 14:46:18 UTC | CC | nberry | |
| RHEL Program Management | 2021-08-16 14:50:40 UTC | Target Release | --- | OCS 4.9.0 |
| Elad | 2021-08-22 13:55:37 UTC | QA Contact | ebenahar | srozen |
| Shay Rozen | 2021-08-22 20:39:54 UTC | Flags | needinfo?(shan) needinfo?(olakra) needinfo?(muagarwa) | |
| Sébastien Han | 2021-08-23 13:30:58 UTC | Flags | needinfo?(shan) needinfo?(shan) | |
| Elad | 2021-08-25 09:25:20 UTC | Keywords | AutomationBackLog | |
| Mudit Agarwal | 2021-08-26 05:18:29 UTC | CC | srozen | |
| Flags | needinfo?(muagarwa) | needinfo?(srozen) | ||
| Shay Rozen | 2021-08-30 08:13:58 UTC | Flags | needinfo?(srozen) | needinfo?(muagarwa) |
| Rejy M Cyriac | 2021-09-26 22:19:00 UTC | Target Release | OCS 4.9.0 | --- |
| Rejy M Cyriac | 2021-09-26 22:20:59 UTC | Product | Red Hat OpenShift Container Storage | Red Hat OpenShift Data Foundation |
| Component | rook | rook | ||
| RHEL Program Management | 2021-09-26 22:23:32 UTC | Target Release | --- | ODF 4.9.0 |
| Mudit Agarwal | 2021-10-04 05:49:06 UTC | Flags | needinfo?(muagarwa) | needinfo?(srozen) |
| Shay Rozen | 2021-10-18 11:29:02 UTC | Blocks | 2015088 | |
| Shay Rozen | 2021-10-18 11:31:32 UTC | Blocks | 2015088 | |
| Status | ON_QA | CLOSED | ||
| Resolution | --- | NOTABUG | ||
| Last Closed | 2021-10-18 11:31:32 UTC | |||
| Rejy M Cyriac | 2021-11-18 15:07:08 UTC | CC | rcyriac | |
| Target Release | ODF 4.9.0 | --- | ||
| Shay Rozen | 2021-11-25 08:28:32 UTC | Flags | needinfo?(olakra) needinfo?(srozen) | |
| Elad | 2023-08-09 17:03:01 UTC | CC | odf-bz-bot |
Back to bug 1975323