File tree Expand file tree Collapse file tree 1 file changed +2
-2
lines changed
website/content/docs/upgrading Expand file tree Collapse file tree 1 file changed +2
-2
lines changed Original file line number Diff line number Diff line change @@ -99,8 +99,8 @@ See [this blog post](https://go.dev/blog/tls-cipher-suites) for more information
9999- Existing Vault installations that use the [ Identity Token
100100backend] ( /api-docs/secret/identity/tokens ) and have [ named
101101keys] ( /api-docs/secret/identity/tokens#create-a-named-key ) generated will
102- encounter a panic when any of those existing keys are rotated once passed its
103- ` rotation_period ` . This issue affects Vault 1.9.0, and fixed in Vault 1.9.1. The
102+ encounter a panic when any of those existing keys pass their
103+ ` rotation_period ` . This issue affects Vault 1.9.0, and is fixed in Vault 1.9.1. The
104104workarounds for this issue are to either 1) delete any existing keys before the
105105update, or 2) increase the rotation period to allow ample time for updating past
1061061.9.0 before a rotation can occur. Workarounds are not necessary if an update to
You can’t perform that action at this time.
0 commit comments