Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add option to use Secrets Store CSI driver to inject secrets into KBS file store #16

Open
bpradipt opened this issue Apr 29, 2024 · 1 comment
Labels
enhancement New feature or request

Comments

@bpradipt
Copy link
Member

A secret store CSI driver can be used to inject the secrets into the KBS file store. See the following blog describing how Azure Key Vault Storage is used to inject secrets into the KBS file store - https://confidentialcontainers.org/docs/key-broker-service/kbs-backed-by-akv/
Similar approach can be followed with Hashicorp vault: https://developer.hashicorp.com/vault/docs/platform/k8s/csi

This issue is to track adding support in the operator for the same

Ref: https://secrets-store-csi-driver.sigs.k8s.io/getting-started/usage.html

@bpradipt bpradipt added the enhancement New feature or request label Apr 29, 2024
lmilleri pushed a commit to lmilleri/trustee-operator that referenced this issue Jul 26, 2024
…-arch

tekton: add multi-arch build pipeline
@bpradipt
Copy link
Member Author

bpradipt commented Dec 4, 2024

This will be mostly documentation.
cc @lmilleri

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

1 participant