-
Notifications
You must be signed in to change notification settings - Fork 552
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
IBM HPCS/Key Protect KMS integration #2723
Conversation
de3585f
to
37fe217
Compare
@Madhu-1 thanks.. I have addressed the comments. ptal.. thanks 👍 |
696a48c
to
adaca60
Compare
}) | ||
|
||
// KeyProtectKMS store the KMS connection information retrieved from the kms configmap | ||
type KeyProtectKMS struct { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
keyProtectKMS
can probably be lowercase?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
All the kms structs are exported atm, so thought of keeping it as exported for now and mark a todo for revisitng all other KMS and its references ..etc.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Where did you mark this TODO?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please also run |
fd9224d
to
e547a21
Compare
yeah. mostly I verify that, but recently , my system started to report out of space before completing the run, so I was skipping it for last few times and kept running only |
@nixpanic comments are addressed.. Thanks.. PTAL. |
This commit adds the support for HPCS/Key Protect IBM KMS service to Ceph CSI service. EncryptDEK() and DecryptDEK() of RBD volumes are done with the help of key protect KMS server by wrapping and unwrapping the DEK and by using the DEKStoreMetadata. Signed-off-by: Humble Chirammal <[email protected]>
Signed-off-by: Humble Chirammal <[email protected]>
This commit add the design considerations of IBM Key protect KMS service to the Ceph CSI integration. Signed-off-by: Humble Chirammal <[email protected]>
This commit adds the Key protect client SDK for the Key Protect KMS integration to the Ceph CSI driver. Signed-off-by: Humble Chirammal <[email protected]>
rbd: Implement Key Protect KMS integration for Ceph CSI
This commit adds the support for HPCS/Key Protect IBM KMS service
to Ceph CSI service. EncryptDEK() and DecryptDEK() of RBD volumes are
done with the help of key protect KMS server by wrapping and unwrapping
the DEK and by using the DEKStoreMetadata.
Fixes: # #2585
What is covered:
Signed-off-by: Humble Chirammal [email protected]