mirror of
https://github.com/ceph/ceph-csi.git
synced 2024-11-17 20:00:23 +00:00
f584db41e6
Hashicorp Vault does not completely remove the secrets in a kv-v2 backend when the keys are deleted. The metadata of the keys will be kept, and it is possible to recover the contents of the keys afterwards. With the new `vaultDestroyKeys` configuration parameter, this behaviour can now be selected. By default the parameter will be set to `true`, indicating that the keys and contents should completely be destroyed. Setting it to any other value will make it possible to recover the deleted keys. Signed-off-by: Niels de Vos <ndevos@redhat.com> |
||
---|---|---|
.. | ||
aws-credentials.yaml | ||
csi-kms-connection-details.yaml | ||
csi-vaulttokenreview-rbac.yaml | ||
kms-config.yaml | ||
tenant-config.yaml | ||
tenant-sa-admin.yaml | ||
tenant-sa.yaml | ||
tenant-token.yaml | ||
user-secret.yaml | ||
vault-psp.yaml | ||
vault.yaml |