I want escrowed disk encryption keys not to be deleted as long as the host is still encrypted,
so that I can recover the key if needed.
Key result
When hosts are moved to a team that has disk encryption off, if an escrow key exists it will be deleted.
This behaviour should be changed.
As long as the host is encrypted, do not delete the key.
Original requests
Context
Product designer: _____
Changes
Product
[ ] UI changes: TODO
[ ] CLI (fleetctl) usage changes: TODO
[ ] YAML changes: TODO
[ ] REST API changes: TODO
[ ] Fleet's agent (fleetd) changes: TODO
[ ] Activity changes: TODO
[ ] Permissions changes: TODO
[ ] Changes to paid features or tiers: TODO
[ ] Other reference documentation changes: TODO
[ ] Once shipped, requester has been notified
[ ] Once shipped, dogfooding issue has been filed
Engineering
[ ] Feature guide changes: TODO
[ ] Database schema migrations: TODO
[ ] Load testing: TODO
ℹ️ Please read this issue carefully and understand it. Pay special attention to UI wireframes, especially "dev notes".
QA
Risk assessment
Requires load testing: TODO
Risk level: Low / High TODO
Risk description: TODO
Manual testing steps
Step 1
Step 2
Step 3
Testing notes
Confirmation
[ ] Engineer (@____): Added comment to user story confirming successful completion of QA.
[ ] QA (@____): Added comment to user story confirming successful completion of QA.
Goal
Key result
When hosts are moved to a team that has disk encryption off, if an escrow key exists it will be deleted. This behaviour should be changed. As long as the host is encrypted, do not delete the key.
Original requests
Context
Changes
Product
Engineering
QA
Risk assessment
Manual testing steps
Testing notes
Confirmation