Hello sig-auth,
Over the last few months we have built a tool that integrates off-cluster secret stores (Hashicorp Vault and Azure Key Vault) with Kubernetes deployments through Container Storage Interface (CSI) volumes. This driver allows Kubernetes to mount multiple secrets, keys, and certificates stored in external secret stores as volumes attached to a Pod. The code is available on GitHub (https://github.com/deislabs/secrets-store-csi-driver) and was demoed to SIG Auth on Jan 23. And here is the Kubecon talk we gave at Kubecon Barcelona in May.
To continue growing the project, we would like to propose contributing the code to the kubernetes-sigs GitHub organization. We feel that the scope and goals for the secrets store driver are pretty well aligned with SIG Auth. To proceed, we would like to:
- Complete a code review with SIG Auth community
- Establish owners for maintenance/bugs/security/features
- Obtain SIG sponsorship for the repo move to kubernetes-sigs
We’d be happy to field any questions/concerns!
Rita
--
You received this message because you are subscribed to the Google Groups "kubernetes-sig-auth" group.
To unsubscribe from this group and stop receiving emails from it, send an email to kubernetes-sig-...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/kubernetes-sig-auth/CAL7%2BV1wbRbwgZybyRAwTtmcdJ5jdaspcaw-zq5kA1pE1XzO7wA%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/kubernetes-sig-auth/CANdooUEFj3ijEps9Kx2i8xHqcjHS9W7AYYftk1gOtyxp9pGAfA%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/kubernetes-sig-auth/CAC8XGpEMZ2Ki29VtL4_V4bOtmZYQa4LwgDFwc9%2B1fQU%3D2gM7EQ%40mail.gmail.com.
+1 sounds great to me
To unsubscribe from this group and stop receiving emails from it, send an email to kubernetes-sig-auth+unsub...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/kubernetes-sig-auth/CAL7%2BV1wbRbwgZybyRAwTtmcdJ5jdaspcaw-zq5kA1pE1XzO7wA%40mail.gmail.com.
--
You received this message because you are subscribed to the Google Groups "kubernetes-sig-auth" group.
To unsubscribe from this group and stop receiving emails from it, send an email to kubernetes-sig-auth+unsub...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/kubernetes-sig-auth/CANdooUEFj3ijEps9Kx2i8xHqcjHS9W7AYYftk1gOtyxp9pGAfA%40mail.gmail.com.
--
You received this message because you are subscribed to the Google Groups "kubernetes-sig-auth" group.
To unsubscribe from this group and stop receiving emails from it, send an email to kubernetes-sig-auth+unsub...@googlegroups.com.
To unsubscribe from this group and stop receiving emails from it, send an email to kubernetes-sig-...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/kubernetes-sig-auth/CAL7%2BV1wbRbwgZybyRAwTtmcdJ5jdaspcaw-zq5kA1pE1XzO7wA%40mail.gmail.com.
--
You received this message because you are subscribed to the Google Groups "kubernetes-sig-auth" group.
To unsubscribe from this group and stop receiving emails from it, send an email to kubernetes-sig-...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/kubernetes-sig-auth/CANdooUEFj3ijEps9Kx2i8xHqcjHS9W7AYYftk1gOtyxp9pGAfA%40mail.gmail.com.
--
You received this message because you are subscribed to the Google Groups "kubernetes-sig-auth" group.
To unsubscribe from this group and stop receiving emails from it, send an email to kubernetes-sig-...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/kubernetes-sig-auth/CAC8XGpEMZ2Ki29VtL4_V4bOtmZYQa4LwgDFwc9%2B1fQU%3D2gM7EQ%40mail.gmail.com.
--
You received this message because you are subscribed to the Google Groups "kubernetes-sig-auth" group.
To unsubscribe from this group and stop receiving emails from it, send an email to kubernetes-sig-...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/kubernetes-sig-auth/69d817da-fc76-4db3-af5c-2d047d34efb1%40googlegroups.com.
Thanks for the feedback David, you raised some good points. This proposal to move the repo into Kubernetes-sigs was raised by interested contributors who want this project to be in a neutral home before they can contribute. In the discussions we have had with sig-auth since January, there has been positive feedback from the sig-auth chairs that this project would be a good fit for Kubernetes-sigs. I suggest the best path forward is to have the sig-auth chairs make a decision on whether this should be included.
Regarding the issue you raised about csi storage drivers, the project has already split out the providers out of tree. Only the core interfaces is now part of secrets store csi driver project. Provider plugins now all live in their own repos and are managed by individual vendors.
Again our goal is to have this project be part of a neutral home for contributors and broader adoption.
The stance from sig-storage is that the csi storage drivers should be maintained by the vendors producing them.
To view this discussion on the web visit https://groups.google.com/d/msgid/kubernetes-sig-auth/CAFS1MjK3uEU0jZdef4FuvuJfFOSwuGUW4kPBOxHL3W%3DG_1tK1A%40mail.gmail.com.
Rita Zhang wrote:
This proposal to move the repo into Kubernetes-sigs was raised by interested contributors who want this project to be in a neutral home before they can contribute.
Rita Zhang wrote:
Regarding the issue you raised about csi storage drivers, the project has already split out the providers out of tree. Only the core interfaces is now part of secrets store csi driver project. Provider plugins now all live in their own repos and are managed by individual vendors.
Mike Danese wrote:
I would argue that the mere existence of this project benefits the sig-auth and Kubernetes community. Given the alignment of objectives between this project and sig-auth, the community will benefit further by its success.
--
You received this message because you are subscribed to the Google Groups "kubernetes-sig-auth" group.
To unsubscribe from this group and stop receiving emails from it, send an email to kubernetes-sig-...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/kubernetes-sig-auth/CAMBP-p%2BCwVrPCeHoJ%2Be%2B7t9Cv3tgNVwYcgEhSNCX6DPC1TFjig%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/kubernetes-sig-auth/CAKT2ragXX%3DkcGfOg4icb4-97yvfbx%3DmYE6Da9HWQ%3DdQx7oaWVg%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/kubernetes-sig-auth/CAAEv1BzyjKDwRhdjJaq8q2eYE6-de4QqYEPnXNkjwKTRkn-%2Bzw%40mail.gmail.com.
To reply to Jordan's concerns:As we're trying to figure out if the SIG has capacity to adopt this project, is there a concrete list of those people with intent to contribute to and own this effort? That's what I was asking for originally with the "establish owners for maintenance/bugs/security/features" request.I've listed the users in the OWNERS section in this issue https://github.com/kubernetes/org/issues/1245 please lmk if that is not sufficient.
The original request made reference to completing a code review with SIG Auth community. Has that been done? Was there sufficient bandwidth/engagement there?It has not. Can you please provide some guidance on how to do this? Who from sig-auth should we work with?
secrets-store.csi.k8s.com(not the CRD name), which can only be updated to secrets-store.csi.k8s.io #129 after the repo move, per sig-storage review comment here> I still had that question about how specific providers will be supported/tested. Currently, the repo indicates two supported providers, and embeds manifests and test jobs for the two providers. Are those manifests considered canonical, or only for test purposes? Would all providers be allowed/encouraged to add themselves to the list of supported providers and contribute merge-blocking CI jobs as well?1. To add a new provider to the supported providers list, the provider needs to add themselves to the e2e test suite here that runs on every driver PR to ensure changes in the driver consistently work with the latest stable version of each provider. It is up to the provider maintainer to push the latest stable version of the provider upstream into the driver repo, e.g. here.2. Each provider is encouraged to use the latest stable driver to its e2e test suite e.g. here that runs on every PR to ensure changes in the provider consistently work with the latest stable version of the driver.