Skip to content

Core: Clean up encryption keys as part of RemoveSnapshots#16353

Open
Hugo-WB wants to merge 1 commit into
apache:mainfrom
Hugo-WB:cleanup-encryption-keys
Open

Core: Clean up encryption keys as part of RemoveSnapshots#16353
Hugo-WB wants to merge 1 commit into
apache:mainfrom
Hugo-WB:cleanup-encryption-keys

Conversation

@Hugo-WB
Copy link
Copy Markdown
Contributor

@Hugo-WB Hugo-WB commented May 15, 2026

Fixes the first part of: #16352 for ExpireSnapshots
By calling removeEncryptionKey when we remove snapshot from metadata.

This assumes that snapshot <> encryption key is 1:1. I think this is a valid assumption given a new encryption key is created per manifest list here? But keen to get thoughts from others on this invariant, I am relatively unfamiliar with all this. Do people know what the intention here was? Are there cases where key re-use could happen?

@github-actions github-actions Bot added the core label May 15, 2026
@Hugo-WB Hugo-WB force-pushed the cleanup-encryption-keys branch from 3166d6c to 3d534d6 Compare May 15, 2026 16:19
@Hugo-WB Hugo-WB marked this pull request as ready for review May 18, 2026 12:20
@Hugo-WB
Copy link
Copy Markdown
Contributor Author

Hugo-WB commented May 18, 2026

@ggershinsky curious to hear your thoughts on above. Specifically the questions I left in the PR description. Thanks!

@ggershinsky
Copy link
Copy Markdown
Contributor

sgtm. manifest list file keys are generated per snapshot, and are not re-used. if a snapshot is removed, no reason to keep its key.

@Hugo-WB
Copy link
Copy Markdown
Contributor Author

Hugo-WB commented May 18, 2026

sounds good. @huaxingao could I get a review on the above please!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants