-
Notifications
You must be signed in to change notification settings - Fork 212
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cleanup old JWT tables in 5.0.1+ #6222
Comments
Merged
Checking before and after can be done with
A good idea may be to add a trigger snapshot action to the proposal for the removal, to get a fresh snapshot, post-removal. |
I am going to execute on this task....seems straight forward mostly deleting references to old JWT tables in code and adding a new Proposal for removing tables from KV |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
TL;DR
We kept
Legacy:: tables
for JWT in #6175, for reasons explained here. This can be safely removed after ensuring old tables are no longer used anywhere in the system.In CCF we periodically fetch/store key certificates for the configured issuer.
Before
5.0.x
we stored the needed info in this tablespublic_signing_keys
(here)jwt.public_signing_key_issuer
(here)After
5.x.x
, we only put the newly fetched one new table:public_signing_keys_metadata
(here)After upgrading
4.x.x
- >5.x.x
the new code will store JWT certificates in the new tables, but will read from both new and old tables in order. Old tables are used if the keys haven’t been fetched yet by any of the new nodes.This task is to support further upgrading from the first
5.x.x
to the5.x.y
with a proper clean-up of the old tables. It's two-fold:Legacy::
tablesread_ledger.py
set_jwt_issuer
(or expose and call a privatejwt_keys/refresh
endpoint) to unconditionally reset the keys insteadtriggerSnapshot
to a proposal so we get a fresh snapshot to grep withread_ledger.py
and check there's no entries in the old tablesThe text was updated successfully, but these errors were encountered: