Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

✨ allow users to select unsafe_skip_registries_wait when create cred defs that support revocation #685

Closed
wants to merge 8 commits into from

Conversation

ff137
Copy link
Collaborator

@ff137 ff137 commented Mar 12, 2024

If revocation is supported ("support_revocation": true), revocation registries will be created.

**NB**: The creation of these revocation registries can take up to one minute.

The default behaviour of this endpoint is to wait for revocation registries to be active before completing.
Therefore, advanced users can optionally set unsafe_skip_registries_wait to True. This means that the
revocation registries are not awaited as part of this POST call.

@ff137 ff137 force-pushed the feat/unsafe_wait_registries branch from 753ecd6 to c336cbd Compare March 12, 2024 12:03
Base automatically changed from revocation to development March 13, 2024 11:39
@ff137 ff137 force-pushed the feat/unsafe_wait_registries branch from c336cbd to 15087ec Compare March 13, 2024 16:37
Copy link

sonarcloud bot commented Mar 13, 2024

Quality Gate Passed Quality Gate passed

Issues
0 New issues
0 Accepted issues

Measures
0 Security Hotspots
No data about Coverage
No data about Duplication

See analysis details on SonarCloud

@ff137 ff137 added the enhancement New feature or request label May 10, 2024
@ff137
Copy link
Collaborator Author

ff137 commented Dec 3, 2024

Closing as won't do, until it arises again

@ff137 ff137 closed this Dec 3, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants