kms: Root key rotation for Vault KMS#1457
Conversation
8d3c3fc to
41813a9
Compare
|
@dannyzaken @jackyalbo @romayalon can you PTAL? |
|
Testing Results - Configured Vault KMS (vault implementing VersionSingleSecret)
- lastHeartbeatTime: "2024-10-08T08:43:05Z"
lastTransitionTime: "2024-10-08T08:38:35Z"
status: vault
type: KMS-Type
- lastHeartbeatTime: "2024-10-08T08:43:05Z"
lastTransitionTime: "2024-10-08T08:38:35Z"
status: Sync
type: KMS-Status
The same stored in k8s secrets and mounted to endpoint pod
operator logs
|
41813a9 to
0fadbb7
Compare
|
Not a Vault expert, will let @dannyzaken review also. But I think we want both versions in the Vault no? Can we still access version 1 after the rotation? I guess we can't rely only on the mounted secret to have all of the key's history in case of some catastrophic issues during the key rotation in core side. |
@jackyalbo You mean in the vault, we need something like this? with previous secrets? |
0fadbb7 to
25b39e5
Compare
|
pushed changes and tested. Now the vault will have the previous keys as well Initial After KeyRotation Also, tagging @baum as key rotation for k8s (#1071) was done by him. |
|
@dannyzaken, can you PTAL? |
|
Hey @jackyalbo, do we need one more approval ✅ to get PR merged? |
Signed-off-by: Praveen M <m.praveen@ibm.com>
Signed-off-by: Praveen M <m.praveen@ibm.com>
25b39e5 to
53d299b
Compare
|
rebased PR |
We don't; we just need the tests to pass. I re-ran the failing test. |
This PR adds support for key Rotation for Vault KMS.