Closed humblec closed 2 years ago
A couple of additional input here,
I do not have a preference over using libopenstorage or the KeyProtect client directly. If Rook uses libopenstorage, I'd got with that too.
The Amazon KMS provider does not use libopenstorage either.
One other option we have here is exploring KMIP apis for the integration side. exploring those options as well, before we start the implementation here. We can not do both at the same time or in single phase so have to weigh one against other and go ahead accordingly.
After some disussions on this, we are going ahead with key protect API SDK for this inegration atleast in the first phase.
* [ ] The LibOpenstorage api interation looks like bit old (2 years) https://github.com/libopenstorage/secrets/tree/master/ibm , so one thing which we need to take a decision here is : what is the preferred way of integration here ? ie, will use libopenstorage or use direct client SDKs of key protect APIs? @nixpanic any preference ?
The libopenstorage client protect API update PR is in up for review https://github.com/libopenstorage/secrets/pull/58 :+1:
Unfortunately the LBS repo maintenance looks to be really slow/not progressing. We will use KP client SDK directly for this integration.
This has been done and PR is merged, one small update to the internal code base about the env variable name is waiting for confirmation from other related components for consistency. As soon as its available, will clear the milestone or close this issue.
This has been done and PR is merged, one small update to the internal code base about the env variable name is waiting for confirmation from other related components for consistency. As soon as its available, will clear the milestone or close this issue.
https://github.com/ceph/ceph-csi/pull/2747 should address this.
Removing from the release tracker, however keeping this issue open.
@humblec what else is pending here?
This issue has been automatically marked as stale because it has not had recent activity. It will be closed in a week if no further activity occurs. Thank you for your contributions.
@humblec what else is pending here?
Verification from cloud provider is still going on, based on the feedback I have to adjust the requirement or call it as Done.
As I havent heard any issues so far on this, I am closing this one.. will reopen if required..
Describe the feature you'd like to have
IBM Cloud™ Hyper Protect Crypto Services is a key management and cloud hardware security module (HSM). It is designed to enable a user to take control of their cloud data encryption keys and cloud hardware security models, and is the only service in the industry built on FIPS 140-2 Level 4-certified hardware. The request here is to support this KMS integration thus enable the HPCS users to make use of the same in RBD volume operations.
Initial design/Identified changes:
Below parameters can be used to establish the connection to the HPCS service from the CSI driver and make use of the encryption operations:
IBM key protect APIs can be used for the integration and examples can be found here:
afaict, Libopenstorage also got support for key protect APIs https://github.com/libopenstorage/secrets/tree/master/ibm , so we are good to use it via LOS or directlty the key protect clients