Bases: object
Attempt to create the key directory if it doesn’t exist.
Create a key repository and bootstrap it with a key.
keystone_user_id – User ID of the Keystone user.
keystone_group_id – Group ID of the Keystone user.
Load keys from disk into a list.
The first key in the list is the primary key used for encryption. All other keys are active secondary keys that can be used for decrypting tokens.
use_null_key – If true, a known key containing null bytes will be appended to the list of returned keys.
Create a new primary key and revoke excess active keys.
keystone_user_id – User ID of the Keystone user.
keystone_group_id – Group ID of the Keystone user.
Key rotation utilizes the following behaviors:
The highest key number is used as the primary key (used for encryption).
All keys can be used for decryption.
New keys are always created as key “0,” which serves as a placeholder before promoting it to be the primary key.
This strategy allows you to safely perform rotation on one node in a cluster, before syncing the results of the rotation to all other nodes (during both key rotation and synchronization, all nodes must recognize all primary keys).
Except where otherwise noted, this document is licensed under Creative Commons Attribution 3.0 License. See all OpenStack Legal Documents.