Skip to content

Conversation

@ArnaudLcm
Copy link

What
This PR aims to enable the dynamic addition and removal of HPKE configurations on a specific gateway during runtime.

Why
For example, as highlighted in this issue, to support key rotation, it is crucial to have the ability to automatically remove expired HPKE configurations and their associated keys after a defined cryptoperiod instead of re-creating the entire gateway.

Copy link

@thibmeu thibmeu left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

thanks for the PR.

the link you are pointing to is chat.deepseek.com and cannot be accessed. consider updating it

@ArnaudLcm
Copy link
Author

ArnaudLcm commented Feb 3, 2025

thanks for the PR.

the link you are pointing to is chat.deepseek.com and cannot be accessed. consider updating it

Oupsi, use it to check misspelled words or the grammar of some sentences, here you go :): cloudflare/privacy-gateway-server-go#68

Thanks for you quick review !

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants