-
-
Notifications
You must be signed in to change notification settings - Fork 4.7k
fix(updater): Stop expiring secret prematurely #49578
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
9e53b31 to
232970e
Compare
|
/backport to stable30 |
6ee7f8c to
b77688a
Compare
b77688a to
3785f09
Compare
2ed082b to
5769ac9
Compare
5769ac9 to
4624eb3
Compare
Signed-off-by: Josh Richards <[email protected]>
4624eb3 to
a5a65dd
Compare
|
e53025b to
32de00b
Compare
Co-authored-by: Joas Schilling <[email protected]> Signed-off-by: Ferdinand Thiessen <[email protected]> Signed-off-by: Louis Chmn <[email protected]>
32de00b to
7f3ef27
Compare
|
/backport to stable32 |
|
Looks like this will now log a warning on each run, as the default value from |
|
Experiencing same log issue Cleared old |
updater.secretcreation and expiration #45714Summary
#43967 introduced a regression in the handling of the expiration of
updater.secret. The result is thatupdater.secretis expired at the next job interval (~10 minutes). If the web Updater takes >10 minutes this prevents it from continuing.updater.secret.createdvalue when we expire a secretconfig_is_read_onlyin theAdminControllerResetTokenbackground job unit tests to catch the scenario addressed by this PRResetTokenbackground job unit test coverage in generalAdminControllerunit test coverage in generalTODO
staticused in theResetTokentest since it didn't seem to serve a purpose but I may have broken it so may require another look)Checklist