You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently, Only Kubernetes Auth Method is supported as a method to authenticate to Vault from HashiCorp Vault Provider, but what do you think about supporting TLS Certificates Auth Method in addition?
I think that it is good specification ( I am currently investigating how to implement it and whether it is a possible specification... Please let me know if there is other good spec... ) to pass a TLS certificate from the Pod Spec's volume to Secrets Store CSI Driver running as a Node Plugin and use it to authenticate to Vault. The authentication method is specified with a parameter such as authMethod (default: k8s), and the file to be used in the Volume is specified with a parameter such as cert.
@anubhavmishra After adding a parameter such as vaultCertPath, Secrets Store CSI Driver authenticates to Vault with TLS Cert Auth Method using the certificate (mounted in the container) specified by that parameter. How about this specification? If you think that looks good, I’ll create a PR.
Currently, Only Kubernetes Auth Method is supported as a method to authenticate to Vault from HashiCorp Vault Provider, but what do you think about supporting TLS Certificates Auth Method in addition?
I think that it is good specification ( I am currently investigating how to implement it and whether it is a possible specification... Please let me know if there is other good spec... ) to pass a TLS certificate from the Pod Spec's volume to Secrets Store CSI Driver running as a Node Plugin and use it to authenticate to Vault. The authentication method is specified with a parameter such as
authMethod
(default: k8s), and the file to be used in the Volume is specified with a parameter such ascert
.example1. Pass tls cert using config map
example2. Pass tls cert using share volume
The text was updated successfully, but these errors were encountered: