Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support Automatic Key Rotation via the Metastore #99

Open
SalusaSecondus opened this issue Sep 24, 2019 · 0 comments
Open

Support Automatic Key Rotation via the Metastore #99

SalusaSecondus opened this issue Sep 24, 2019 · 0 comments

Comments

@SalusaSecondus
Copy link
Contributor

This depends on #23

We should allow automatic rotation to be configured in the MetaStore such that an attempt to use an overly old key automatically (and silently) triggers creation of a new key. This will maintain the invariant that "No data is encrypted with a key older than $ROTATION_TIME." while not causing needless rotations when no encryption is occurring.

seebees pushed a commit that referenced this issue Dec 12, 2023
*Issue #, if available:* #99

*Description of changes:*

These changes allow for the unit tests to pass when the FIPS validated Bouncy Castle provider is explicitly set.

By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.

# Check any applicable:
- [ ] Were any files moved? Moving files changes their URL, which breaks all hyperlinks to the files.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant