Benny Kopilov at Red Hat was able to reproduce this in Train.
1. image1 is created by the Cinder upload-volume-to-image action.
2. instance1 is created from image1. instance1 is ACTIVE, but unusable (no OS inside).
3. image2 is created by the 'nova image-create' action on the instance. This image contains the same values for cinder_encryption_key_id and cinder_encryption_key_deletion_policy as image1.
4. deleting image2 will result in deleting the key for image1
Benny Kopilov at Red Hat was able to reproduce this in Train.
1. image1 is created by the Cinder upload- volume- to-image action.
2. instance1 is created from image1. instance1 is ACTIVE, but unusable (no OS inside).
3. image2 is created by the 'nova image-create' action on the instance. This image contains the same values for cinder_ encryption_ key_id and cinder_ encryption_ key_deletion_ policy as image1.
4. deleting image2 will result in deleting the key for image1