Skip to content
This repository has been archived by the owner on Jan 8, 2021. It is now read-only.

internal/secure/config.go: specify 10 retry attempts @ 1 Hz (master) #69

Merged
merged 5 commits into from
Nov 14, 2019

Conversation

anonymouse64
Copy link
Contributor

This is a duplicate of #59 and #67 combined into one PR for master/Geneva.

@anonymouse64 anonymouse64 changed the title internal/secure/config.go: specify 10 retry attempts @ 1 Hz internal/secure/config.go: specify 10 retry attempts @ 1 Hz (master) Nov 12, 2019
@lranjbar
Copy link

@anonymouse64 Needs a rebase

This will fix the race condition we currently have when
security-secretstore-setup is run at the same time as docker-edgex-mongo
and the secrets haven't been put into vault yet and currently
docker-edgex-mongo immediately fails when vault returns a 404 for the
secret.

Signed-off-by: Ian Johnson <ian.johnson@canonical.com>
…files

This lets a user configure retry attempts getting secrets from Vault.

Also update the version of go-mod-secrets to allow setting these properties in
the SecretConfig.

Signed-off-by: Ian Johnson <ian.johnson@canonical.com>
Signed-off-by: Ian Johnson <ian.johnson@canonical.com>
Signed-off-by: Ian Johnson <ian.johnson@canonical.com>
…tConfig

This is in concert with a change in go-mod-secrets where the time parsing is
done there and all clients of go-mod-secrets can just provide a string without
concerning much with the internal details of how that is parsed.

Signed-off-by: Ian Johnson <ian.johnson@canonical.com>
@anonymouse64
Copy link
Contributor Author

@lranjbar done rebased

@lranjbar lranjbar self-requested a review November 14, 2019 16:35
@lranjbar lranjbar merged commit c621ad3 into edgexfoundry:master Nov 14, 2019
@anonymouse64 anonymouse64 deleted the bugfix/getsecrets-loop branch November 14, 2019 16:47
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants