mirror of https://github.com/status-im/consul.git
922619dfc3
* Fix leaked Vault LifetimeRenewers When the Vault CA Provider is reconfigured we do not stop the LifetimeRenewers which can cause them to leak until the Consul processes recycles. On Configure execute stopWatcher if it exists and is not nil before starting a new renewal * Add jitter before restarting the LifetimeWatcher If we fail to login to Vault or our token is no longer valid we can overwhelm a Vault instance with many requests very quickly by restarting the LifetimeWatcher. Before restarting the LifetimeWatcher provide a backoff time of 1 second or less. * Use a retry.Waiter instead of RandomStagger * changelog * gofmt'd * Swap out bool for atomic.Unit32 in test * Provide some extra clarification in comment and changelog |
||
---|---|---|
.. | ||
ca | ||
authz.go | ||
authz_test.go | ||
common_names.go | ||
csr.go | ||
generate.go | ||
generate_test.go | ||
parsing.go | ||
sni.go | ||
sni_test.go | ||
testing_ca.go | ||
testing_ca_test.go | ||
testing_spiffe.go | ||
uri.go | ||
uri_agent.go | ||
uri_agent_oss.go | ||
uri_agent_oss_test.go | ||
uri_service.go | ||
uri_service_oss.go | ||
uri_service_oss_test.go | ||
uri_signing.go | ||
uri_signing_test.go | ||
uri_test.go | ||
x509_patch.go | ||
x509_patch_test.go |