ceph-csi/internal
Niels de Vos f584db41e6 util: add vaultDestroyKeys option to destroy Vault kv-v2 secrets
Hashicorp Vault does not completely remove the secrets in a kv-v2
backend when the keys are deleted. The metadata of the keys will be
kept, and it is possible to recover the contents of the keys afterwards.

With the new `vaultDestroyKeys` configuration parameter, this behaviour
can now be selected. By default the parameter will be set to `true`,
indicating that the keys and contents should completely be destroyed.
Setting it to any other value will make it possible to recover the
deleted keys.

Signed-off-by: Niels de Vos <ndevos@redhat.com>
2021-08-06 12:19:18 +00:00
..
cephfs cephfs: support selinux mount options 2021-08-04 12:59:34 +00:00
controller cleanup: resolve nlreturn linter issues 2021-07-22 06:05:01 +00:00
csi-common cleanup: resolve nlreturn linter issues 2021-07-22 06:05:01 +00:00
journal doc: update comments in voljournal 2021-08-05 08:11:15 +00:00
liveness cleanup: resolve nlreturn linter issues 2021-07-22 06:05:01 +00:00
rbd rbd: log LastUpdate in UTC format 2021-08-06 10:18:51 +00:00
util util: add vaultDestroyKeys option to destroy Vault kv-v2 secrets 2021-08-06 12:19:18 +00:00