-
Notifications
You must be signed in to change notification settings - Fork 30
K8SPS-421: Add keyring vault support #938
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
79e5d50
to
97a85e2
Compare
), | ||
SecurityContext: spec.PodSecurityContext, | ||
SecurityContext: spec.PodSecurityContext, | ||
Volumes: statefulSetVolumes(cr), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We have some more prs that are doing almost the same for this release, so we will have conflicts here for sure.
}, | ||
} | ||
|
||
if cr.CompareVersion("0.11.0") >= 0 { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Given that the operator has not been released as GA yet, I think we can skip this check, since we don't do anything similar elsewhere in the codebase at this stage, WDYT?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
no, we decided that we should do version checks starting from this release
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I can't recall the decision, but given that we don't have a related e2e test to ensure that potential changes do not break this consistency, I think we should wait for a test to exist before we start applying compare versions. cc @hors
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
CHANGE DESCRIPTION
This PR adds data-at-rest-encryption support using Vault keyring plugin.
To enable encryption, users need to provide the keyring configuration in a secret (
spec.mysql.vaultSecretName
). Example secret can be found indeploy/vault-secret.yaml
.Two new e2e-tests are added to cover this feature:
CHECKLIST
Jira
Needs Doc
) and QA (Needs QA
)?Tests
Config/Logging/Testability