-
Notifications
You must be signed in to change notification settings - Fork 2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix for dynamically reloading vault #4395
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Add to changelog
command/agent/command.go
Outdated
c.agent.logger.Printf("[ERR] agent: failed to convert server config: %v", err) | ||
if s := c.agent.Server(); s != nil { | ||
sconf, err := convertServerConfig(newConf, c.logOutput) | ||
c.agent.logger.Printf("[DEBUG] agent: starting reload of server config") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can you move this to line 750 (above s.Reload)
nomad/vault_test.go
Outdated
@@ -437,6 +437,31 @@ func TestVaultClient_SetConfig(t *testing.T) { | |||
if client.tokenData == nil || len(client.tokenData.Policies) != 3 { | |||
t.Fatalf("unexpected token: %v", client.tokenData) | |||
} | |||
|
|||
// test that when SetConfig is called with the same configuration, it is a |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Capitol Test
I'm going to lock this pull request because it has been closed for 120 days ⏳. This helps our maintainers find and focus on the active contributions. |
Temporary fix for dynamically reloading Vault configuration for Nomad. Further refactoring is needed to push logic into the client/server and out of the agent.