{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":226350394,"defaultBranch":"master","name":"kes","ownerLogin":"minio","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2019-12-06T14:48:00.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/695951?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1726074544.0","currentOid":""},"activityList":{"items":[{"before":"36fb2040971f503ac444998eab46fc954b629bde","after":null,"ref":"refs/heads/vault-transport","pushedAt":"2024-09-11T07:22:53.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"aead","name":"Andreas Auernhammer","path":"/aead","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/20368805?s=80&v=4"}},{"before":"1da59a00d0c973b4626df250406095453057560b","after":"db17a10103bedc5adaac3a8cf0166a7aea12ebbc","ref":"refs/heads/master","pushedAt":"2024-09-11T07:22:51.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"aead","name":"Andreas Auernhammer","path":"/aead","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/20368805?s=80&v=4"},"commit":{"message":"vault: do not reuse TCP connections (#486)\n\nThis commit disables TCP connection reuse for Vault.\r\nApparently, TCP connections to Vault might hang if Vault\r\ngets shutdown forcefully.\r\n\r\nThe downside of this commit is that KES has to re-open a new\r\nTCP connection for every interaction with Vault. However,\r\nKES should not rach out to Vault most of them time. Hence, this\r\nchange seems acceptable.\r\n\r\nSigned-off-by: Andreas Auernhammer ","shortMessageHtmlLink":"vault: do not reuse TCP connections (#486)"}},{"before":"4e7242c633146a28a03d3ccf3ba33b936a38b9f8","after":"36fb2040971f503ac444998eab46fc954b629bde","ref":"refs/heads/vault-transport","pushedAt":"2024-09-10T18:09:37.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"aead","name":"Andreas Auernhammer","path":"/aead","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/20368805?s=80&v=4"},"commit":{"message":"vault: do not reuse TCP connections\n\nThis commit disables TCP connection reuse for Vault.\nApparently, TCP connections to Vault might hang if Vault\ngets shutdown forcefully.\n\nThe downside of this commit is that KES has to re-open a new\nTCP connection for every interaction with Vault. However,\nKES should not rach out to Vault most of them time. Hence, this\nchange seems acceptable.\n\nSigned-off-by: Andreas Auernhammer ","shortMessageHtmlLink":"vault: do not reuse TCP connections"}},{"before":"503251c150706128a9ec050495791086d72ea361","after":"4e7242c633146a28a03d3ccf3ba33b936a38b9f8","ref":"refs/heads/vault-transport","pushedAt":"2024-09-10T18:09:01.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"aead","name":"Andreas Auernhammer","path":"/aead","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/20368805?s=80&v=4"},"commit":{"message":"vault: do not reuse TCP connections\n\nThis commit disables TCP connection reuse for Vault.\nApparently, TCP connections to Vault might hang if Vault\ngets shutdown forcefully.\n\nThe downside of this commit is that KES has to re-open a new\nTCP connection for every interaction with Vault. However,\nKES should not rach out to Vault most of them time. Hence, this\nchange seems acceptable.\n\nSigned-off-by: Andreas Auernhammer ","shortMessageHtmlLink":"vault: do not reuse TCP connections"}},{"before":null,"after":"503251c150706128a9ec050495791086d72ea361","ref":"refs/heads/vault-transport","pushedAt":"2024-09-10T18:05:31.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"aead","name":"Andreas Auernhammer","path":"/aead","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/20368805?s=80&v=4"},"commit":{"message":"vault: do not reuse TCP connections\n\nThis commit disables TCP connection reuse for Vault.\nApparently, TCP connections to Vault might hang if Vault\ngets shutdown forcefully.\n\nThe downside of this commit is that KES has to re-open a new\nTCP connection for every interaction with Vault. However,\nKES should not rach out to Vault most of them time. Hence, this\nchange seems acceptable.\n\nSigned-off-by: Andreas Auernhammer ","shortMessageHtmlLink":"vault: do not reuse TCP connections"}},{"before":"c07d23a2561a10036b667746a9f88c6d7dbbc88f","after":"1da59a00d0c973b4626df250406095453057560b","ref":"refs/heads/master","pushedAt":"2024-09-03T10:39:51.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"aead","name":"Andreas Auernhammer","path":"/aead","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/20368805?s=80&v=4"},"commit":{"message":"entrust: Close body to avoid some conn leaks (#485)\n\nAlso ensure that we drain the body before closing to it to reuse the\r\nexisting connections when possible.\r\n\r\nCo-authored-by: Anis Eleuch ","shortMessageHtmlLink":"entrust: Close body to avoid some conn leaks (#485)"}},{"before":"e8dffb2451f75dc776c159797170378a77238b13","after":null,"ref":"refs/heads/vault-token-renewal","pushedAt":"2024-08-22T09:44:40.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"harshavardhana","name":"Harshavardhana","path":"/harshavardhana","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/622699?s=80&v=4"}},{"before":"bc4783a9fb1dce2e9da41df984734a708d7edb42","after":"c07d23a2561a10036b667746a9f88c6d7dbbc88f","ref":"refs/heads/master","pushedAt":"2024-08-22T09:44:38.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"harshavardhana","name":"Harshavardhana","path":"/harshavardhana","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/622699?s=80&v=4"},"commit":{"message":"vault: renew token earlier (#481)\n\nThis commit changes the Vault token renewal logic to renew\r\na token earlier than 10s before it expires. Now, KES renews\r\nthe token once 80% of the token TTL has passed.\r\n\r\nThis commit also adds a `context.Context` to the Vault authentication\r\nfunction.\r\n\r\nSigned-off-by: Andreas Auernhammer ","shortMessageHtmlLink":"vault: renew token earlier (#481)"}},{"before":"dc4cf65d9b8e70e7e42b75e90c4e4c01f86a24b6","after":"e8dffb2451f75dc776c159797170378a77238b13","ref":"refs/heads/vault-token-renewal","pushedAt":"2024-08-22T09:22:48.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"aead","name":"Andreas Auernhammer","path":"/aead","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/20368805?s=80&v=4"},"commit":{"message":"vault: renew token earlier\n\nThis commit changes the Vault token renewal logic to renew\na token earlier than 10s before it expires. Now, KES renews\nthe token once 80% of the token TTL has passed.\n\nThis commit also adds a `context.Context` to the Vault authentication\nfunction.\n\nSigned-off-by: Andreas Auernhammer ","shortMessageHtmlLink":"vault: renew token earlier"}},{"before":"a2d46c208ce95397310ed56d4708cf4db209b856","after":"dc4cf65d9b8e70e7e42b75e90c4e4c01f86a24b6","ref":"refs/heads/vault-token-renewal","pushedAt":"2024-08-22T08:16:22.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"aead","name":"Andreas Auernhammer","path":"/aead","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/20368805?s=80&v=4"},"commit":{"message":"vault: renew token earlier\n\nThis commit changes the Vault token renewal logic to renew\na token earlier than 10s before it expires. Now, KES renews\nthe token once 80% of the token TTL has passed.\n\nThis commit also adds a `context.Context` to the Vault authentication\nfunction.\n\nSigned-off-by: Andreas Auernhammer ","shortMessageHtmlLink":"vault: renew token earlier"}},{"before":"3d1093b4eb3c2620ccc888c93e16e25aeaf2621d","after":"a2d46c208ce95397310ed56d4708cf4db209b856","ref":"refs/heads/vault-token-renewal","pushedAt":"2024-08-22T08:15:27.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"aead","name":"Andreas Auernhammer","path":"/aead","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/20368805?s=80&v=4"},"commit":{"message":"vault: renew token earlier\n\nThis commit changes the Vault token renewal logic to renew\na token earlier than 10s before it expires. Now, if the token\nhas a TTL > than 1m (or 30s) the token is renewed 1m (or 30s)\nbefore it expires.\n\nThis commit also adds a `context.Context` to the Vault authentication\nfunction.\n\nSigned-off-by: Andreas Auernhammer ","shortMessageHtmlLink":"vault: renew token earlier"}},{"before":"447ba08960c9997635c7884a10ba3777d17a5092","after":"3d1093b4eb3c2620ccc888c93e16e25aeaf2621d","ref":"refs/heads/vault-token-renewal","pushedAt":"2024-08-21T12:31:45.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"aead","name":"Andreas Auernhammer","path":"/aead","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/20368805?s=80&v=4"},"commit":{"message":"vault: renew token earlier\n\nThis commit changes the Vault token renewal logic to renew\na token earlier than 10s before it expires. Now, if the token\nhas a TTL > than 1m (or 30s) the token is renewed 1m (or 30s)\nbefore it expires.\n\nThis commit also adds a `context.Context` to the Vault authentication\nfunction.\n\nSigned-off-by: Andreas Auernhammer ","shortMessageHtmlLink":"vault: renew token earlier"}},{"before":null,"after":"447ba08960c9997635c7884a10ba3777d17a5092","ref":"refs/heads/vault-token-renewal","pushedAt":"2024-08-21T12:30:47.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"aead","name":"Andreas Auernhammer","path":"/aead","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/20368805?s=80&v=4"},"commit":{"message":"vault: renew token earlier\n\nThis commit changes the Vault token renewal logic to renew\na token earlier than 10s before it expires. Now, if the token\nhas a TTL > than 1m (or 30s) the token is renewed 1m (or 30s)\nbefore it expires.\n\nThis commit also adds a `context.Context` to the Vault authentication\nfunction.\n\nSigned-off-by: Andreas Auernhammer ","shortMessageHtmlLink":"vault: renew token earlier"}},{"before":"0d1464ec832272029aa4ceca28f51e264949cbdd","after":"bc4783a9fb1dce2e9da41df984734a708d7edb42","ref":"refs/heads/master","pushedAt":"2024-08-21T12:21:57.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"harshavardhana","name":"Harshavardhana","path":"/harshavardhana","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/622699?s=80&v=4"},"commit":{"message":"fix: remove tab character from example yaml config as it is invalid (#479)","shortMessageHtmlLink":"fix: remove tab character from example yaml config as it is invalid (#…"}},{"before":"3322b97e23cfee59b1f5e34e88c4ecda1939f9eb","after":null,"ref":"refs/heads/entrust-http-client","pushedAt":"2024-08-16T14:39:30.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"aead","name":"Andreas Auernhammer","path":"/aead","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/20368805?s=80&v=4"}},{"before":"ef3f85cb2ab073f0396b56544631ce503c4c3ed9","after":"0d1464ec832272029aa4ceca28f51e264949cbdd","ref":"refs/heads/master","pushedAt":"2024-08-16T14:39:28.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"aead","name":"Andreas Auernhammer","path":"/aead","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/20368805?s=80&v=4"},"commit":{"message":"entrust: use reasonable defaults for HTTP transport (#477)\n\nThis commit fixes the HTTP transport of the entrust keycontrol client\r\nto use a connection pool to reuse connections or close idle ones.\r\n\r\nSigned-off-by: Andreas Auernhammer ","shortMessageHtmlLink":"entrust: use reasonable defaults for HTTP transport (#477)"}},{"before":null,"after":"3322b97e23cfee59b1f5e34e88c4ecda1939f9eb","ref":"refs/heads/entrust-http-client","pushedAt":"2024-08-16T14:35:36.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"aead","name":"Andreas Auernhammer","path":"/aead","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/20368805?s=80&v=4"},"commit":{"message":"entrust: use reasonable defaults for HTTP transport\n\nThis commit fixes the HTTP transport of the entrust keycontrol client\nto use a connection pool to reuse connections or close idle ones.\n\nSigned-off-by: Andreas Auernhammer ","shortMessageHtmlLink":"entrust: use reasonable defaults for HTTP transport"}},{"before":"ef54824a010f6260b34d273b7ec82ff4c8918cc0","after":null,"ref":"refs/heads/vault-clone-client","pushedAt":"2024-08-15T15:49:33.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"harshavardhana","name":"Harshavardhana","path":"/harshavardhana","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/622699?s=80&v=4"}},{"before":"c1fa6dc180ed2d6aa2a76698755337f1b9ecf337","after":"ef3f85cb2ab073f0396b56544631ce503c4c3ed9","ref":"refs/heads/master","pushedAt":"2024-08-15T15:49:31.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"harshavardhana","name":"Harshavardhana","path":"/harshavardhana","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/622699?s=80&v=4"},"commit":{"message":"vault: clone client TLS config and headers for status checks (#476)\n\nThis commit improves the Vault status check logic. KES has to\r\nclone the Vault client since it has to clear the namespace header\r\nfor status checks.\r\n\r\nHowever, KES should use the same TLS client config and token configured\r\non the client when performing such status checks. KES has to opt-in\r\nto this behavior since the Vault SDK doesn't do this by default.\r\n\r\nSigned-off-by: Andreas Auernhammer ","shortMessageHtmlLink":"vault: clone client TLS config and headers for status checks (#476)"}},{"before":null,"after":"ef54824a010f6260b34d273b7ec82ff4c8918cc0","ref":"refs/heads/vault-clone-client","pushedAt":"2024-08-15T14:32:39.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"aead","name":"Andreas Auernhammer","path":"/aead","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/20368805?s=80&v=4"},"commit":{"message":"vault: clone client TLS config and headers for status checks\n\nThis commit improves the Vault status check logic. KES has to\nclone the Vault client since it has to clear the namespace header\nfor status checks.\n\nHowever, KES should use the same TLS client config and token configured\non the client when performing such status checks. KES has to opt-in\nto this behavior since the Vault SDK doesn't do this by default.\n\nSigned-off-by: Andreas Auernhammer ","shortMessageHtmlLink":"vault: clone client TLS config and headers for status checks"}},{"before":"ca6a5b9aa0e51e81f9b46f15af6d08c13d21746b","after":"c1fa6dc180ed2d6aa2a76698755337f1b9ecf337","ref":"refs/heads/master","pushedAt":"2024-07-28T07:35:04.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"aead","name":"Andreas Auernhammer","path":"/aead","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/20368805?s=80&v=4"},"commit":{"message":"Fix name of application (#475)\n\n* Fix name of application\r\n\r\n* Upgrade Go versions\r\n\r\n* Updated `azidentity`","shortMessageHtmlLink":"Fix name of application (#475)"}},{"before":"94e072dd7bf07179204b8b8a7c491102d81ea147","after":null,"ref":"refs/heads/dependabot/go_modules/github.com/Azure/azure-sdk-for-go/sdk/azidentity-1.6.0","pushedAt":"2024-06-26T14:12:50.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"dependabot[bot]","name":null,"path":"/apps/dependabot","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/29110?s=80&v=4"}},{"before":"a5a1f7d4f8169a5306d97ee8d483d04c95ee3063","after":null,"ref":"refs/heads/dependabot/go_modules/github.com/hashicorp/go-retryablehttp-0.7.7","pushedAt":"2024-06-26T14:12:49.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"dependabot[bot]","name":null,"path":"/apps/dependabot","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/29110?s=80&v=4"}},{"before":"d911c19570a216398b7c090a90c1cecfe1cbf649","after":null,"ref":"refs/heads/update-dep","pushedAt":"2024-06-26T14:12:42.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"aead","name":"Andreas Auernhammer","path":"/aead","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/20368805?s=80&v=4"}},{"before":"12195cc387d860517221548b6297471c92978f68","after":"ca6a5b9aa0e51e81f9b46f15af6d08c13d21746b","ref":"refs/heads/master","pushedAt":"2024-06-26T14:12:40.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"aead","name":"Andreas Auernhammer","path":"/aead","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/20368805?s=80&v=4"},"commit":{"message":"update `go.mod` dependencies (#473)\n\nThis commit updates various dependencies w.r.t bugfixes.\r\n\r\nSigned-off-by: Andreas Auernhammer ","shortMessageHtmlLink":"update go.mod dependencies (#473)"}},{"before":"e0e783667e6b677b078fe4e2a231bd8d7e17ba7a","after":"d911c19570a216398b7c090a90c1cecfe1cbf649","ref":"refs/heads/update-dep","pushedAt":"2024-06-26T14:07:58.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"aead","name":"Andreas Auernhammer","path":"/aead","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/20368805?s=80&v=4"},"commit":{"message":"update `go.mod` dependencies\n\nThis commit updates various dependencies w.r.t bugfixes.\n\nSigned-off-by: Andreas Auernhammer ","shortMessageHtmlLink":"update go.mod dependencies"}},{"before":null,"after":"e0e783667e6b677b078fe4e2a231bd8d7e17ba7a","ref":"refs/heads/update-dep","pushedAt":"2024-06-26T14:04:37.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"aead","name":"Andreas Auernhammer","path":"/aead","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/20368805?s=80&v=4"},"commit":{"message":"update `go.mod` dependencies\n\nThis commit updates various dependencies w.r.t bugfixes.\n\nSigned-off-by: Andreas Auernhammer ","shortMessageHtmlLink":"update go.mod dependencies"}},{"before":null,"after":"a5a1f7d4f8169a5306d97ee8d483d04c95ee3063","ref":"refs/heads/dependabot/go_modules/github.com/hashicorp/go-retryablehttp-0.7.7","pushedAt":"2024-06-24T22:12:15.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"dependabot[bot]","name":null,"path":"/apps/dependabot","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/29110?s=80&v=4"},"commit":{"message":"build(deps): bump github.com/hashicorp/go-retryablehttp\n\nBumps [github.com/hashicorp/go-retryablehttp](https://github.com/hashicorp/go-retryablehttp) from 0.7.5 to 0.7.7.\n- [Changelog](https://github.com/hashicorp/go-retryablehttp/blob/main/CHANGELOG.md)\n- [Commits](https://github.com/hashicorp/go-retryablehttp/compare/v0.7.5...v0.7.7)\n\n---\nupdated-dependencies:\n- dependency-name: github.com/hashicorp/go-retryablehttp\n dependency-type: indirect\n...\n\nSigned-off-by: dependabot[bot] ","shortMessageHtmlLink":"build(deps): bump github.com/hashicorp/go-retryablehttp"}},{"before":"0f1d9ee09a0c413db500b4b810fc620c37a36fcb","after":null,"ref":"refs/heads/keystore-leak","pushedAt":"2024-06-17T15:47:06.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"harshavardhana","name":"Harshavardhana","path":"/harshavardhana","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/622699?s=80&v=4"}},{"before":"f111da8ee48036786b643078086ce10988ab9452","after":"12195cc387d860517221548b6297471c92978f68","ref":"refs/heads/master","pushedAt":"2024-06-17T15:47:05.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"harshavardhana","name":"Harshavardhana","path":"/harshavardhana","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/622699?s=80&v=4"},"commit":{"message":"fix goroutine leak when reloading server config (#469)\n\nThis commit fixes a goroutine leak that occurs when\r\nreloading the server configuration.\r\n\r\nDuring a config reload, the server establishes a 2nd\r\nconnection to the backend keystore and replaces the\r\nexisting connection with the newly opened one. The switch\r\nis performed atomically (without locking) to not block\r\nor abort ongoing requests.\r\n\r\nOnce the server has replaced the keystore connection,\r\nit closes it. Before this commit, the server stopped\r\nthe in-memory key cache and its GC goroutines. However,\r\nit did not close any resources (goroutines/file descriptors)\r\nallocated by the replaced keystore. This commit fixes this.\r\n\r\nSigned-off-by: Andreas Auernhammer ","shortMessageHtmlLink":"fix goroutine leak when reloading server config (#469)"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOS0xMVQwNzoyMjo1My4wMDAwMDBazwAAAASy4BzG","startCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOS0xMVQwNzoyMjo1My4wMDAwMDBazwAAAASy4BzG","endCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wNi0xN1QxNTo0NzowNS4wMDAwMDBazwAAAARnjGBV"}},"title":"Activity · minio/kes"}