-
-
Notifications
You must be signed in to change notification settings - Fork 607
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cleanup 'CheckRenewalExemptionAtWFE' feature flag #7680
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Before landing this change, we need to land a separate change which enables this flag in the //test/config/[ra|wfe2].json files.
For the separate change, what can I do to help move this forward? |
I've added a PR to do this (#7706). |
Once this PR is merged and passes the tests, I need to |
Yes, exactly. |
…t and checkCertificatesPerNameLimit methods fixes: letsencrypt#7511
// renewal. | ||
// | ||
// TODO(#7511): Remove this feature flag. | ||
CheckRenewalExemptionAtWFE bool |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We don't immediately remove feature flags -- to ensure ease of deployability alongside existing configuration files, we first deprecate them. This should be moved up to line 31, next to the other deprecated-but-not-yet-deleted feature flags.
@@ -677,19 +677,6 @@ func (ra *RegistrationAuthorityImpl) checkInvalidAuthorizationLimit(ctx context. | |||
// rate limit. This rate limit ensures a client can not create more than the | |||
// specified threshold of new orders within the specified time window. | |||
func (ra *RegistrationAuthorityImpl) checkNewOrdersPerAccountLimit(ctx context.Context, acctID int64, names []string, limit ratelimit.RateLimitPolicy) error { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The tests are failing because this function no longer uses the input parameter names
. That parameter should be removed from this function definition and from all call-sites.
@@ -106,9 +106,7 @@ | |||
} | |||
} | |||
}, | |||
"features": { | |||
"CheckRenewalExemptionAtWFE": true |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This should be left in place for now, to reflect the fact that we haven't actually deleted the feature flag from our production configs yet -- that can't happen until after the rest of this change has been merged and deployed.
@@ -105,8 +105,7 @@ | |||
"authorizationLifetimeDays": 30, | |||
"pendingAuthorizationLifetimeDays": 7, | |||
"features": { | |||
"ServeRenewalInfo": true, | |||
"CheckRenewalExemptionAtWFE": true |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Same here.
The remaining unit test failures are due to the removal of calls to |
Cleanup
CheckRenewalExemptionAtWFE
feature flag,it now determines exemption based on theisRenewal
parameter.fixes: #7511