@@ -1267,8 +1267,11 @@ test_aws_kek(#{data := #{stored_ids := [StoredId | _]} = Data} = Secret) ->
12671267 end .
12681268
12691269- spec ensure_aws_kek_on_disk (secret_props (), boolean ()) -> ok | {error , _ }.
1270- ensure_aws_kek_on_disk (#{data := #{stored_ids := StoredIds } = Data },
1270+ ensure_aws_kek_on_disk (#{id := SecretId ,
1271+ data := #{stored_ids := StoredIds } = Data },
12711272 TestOnly ) ->
1273+ ? log_debug (" Ensure all keys are on disk for secret ~p "
1274+ " (number of keys to check: ~b )" , [SecretId , length (StoredIds )]),
12721275 Params = maps :with ([key_arn , region , profile , config_file ,
12731276 credentials_file , use_imds ], Data ),
12741277 Res = lists :map (
@@ -1289,10 +1292,14 @@ test_kmip_kek(#{data := Data} = Secret) ->
12891292 end .
12901293
12911294- spec ensure_kmip_kek_on_disk (secret_props (), boolean ()) -> ok | {error , _ }.
1292- ensure_kmip_kek_on_disk (#{data := #{active_key := ActiveKey ,
1295+ ensure_kmip_kek_on_disk (#{id := SecretId ,
1296+ data := #{active_key := ActiveKey ,
12931297 hist_keys := OtherKeys ,
12941298 key_passphrase := Pass } = Data } = Secret ,
12951299 TestOnly ) ->
1300+ ? log_debug (" Ensure all keys are on disk for secret ~p "
1301+ " (number of keys to check: ~b )" ,
1302+ [SecretId , length (OtherKeys ) + 1 ]),
12961303 {DecryptRes , KekId } =
12971304 case Pass of
12981305 #{type := sensitive , data := D , encrypted_by := undefined } ->
0 commit comments