-
Notifications
You must be signed in to change notification settings - Fork 23
Description
While profiling an application I could find latency spikes, relate to decryption
If an application is regularly using a DEK for decryption, it can expire due to its TTL
As I read the code the TTL is set when the key is created. Is seems sensible that the key would expire when not used, but if used frequently why should it expire?
I appreciate that its a bit harder to manage different expiration policy for encryption and decryption, and that old unused DEKs should be expired, but it seems to me that this isn't the case for frequently used decryption DEKs.
The decryption materials if deleted would be creates again moments later (I am presuming the same materials), so this seems to be an unnessessary latency
Could we either refresh in the background, or change the eviction semantics
Happy to contribute/colaborate but will need some steer for the existing maintainers