Skip to content

Conversation

@Jakob-Naucke
Copy link
Contributor

Previously, disk encryption secrets were deleted directly with the
associated machine resource, and subsequently unmounted from Trustee
pods, which causes a pod restart. Because secret deletion is merely
housekeeping, not a time-critical purge, delay unmount until the next
secret mount: Whenever secrets are to be mounted, partition secrets
into "mount" and "discard".

Picks one tests-related commit out of #111.

@Jakob-Naucke Jakob-Naucke requested a review from alicefr December 17, 2025 16:00
For reuse in register-server. Also remove some duplicate definitions
from Trustee tests.

Signed-off-by: Jakob Naucke <jnaucke@redhat.com>
Was `test-coreos-vm` for all.

Signed-off-by: Jakob Naucke <jnaucke@redhat.com>
instead of templates, to use in a test and save some lines

Signed-off-by: Jakob Naucke <jnaucke@redhat.com>
Previously, disk encryption secrets were deleted directly with the
associated machine resource, and subsequently unmounted from Trustee
pods, which causes a pod restart. Because secret deletion is merely
housekeeping, not a time-critical purge, delay unmount until the next
secret mount: Whenever secrets are to be mounted, partition secrets
into "mount" and "discard".

Signed-off-by: Jakob Naucke <jnaucke@redhat.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant