-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(CSI-316): support encryption with custom settings per filesystem #444
Draft
sergeyberezansky
wants to merge
10
commits into
graphite-base/444
Choose a base branch
from
sergey/per-filesystem-encryption
base: graphite-base/444
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Draft
feat(CSI-316): support encryption with custom settings per filesystem #444
sergeyberezansky
wants to merge
10
commits into
graphite-base/444
from
sergey/per-filesystem-encryption
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This was referenced Feb 6, 2025
Merged
Warning This pull request is not mergeable via GitHub because a downstack PR is open. Once all requirements are satisfied, merge this PR as a stack on Graphite.
This stack of pull requests is managed by Graphite. Learn more about stacking. |
fbf1b36
to
2134746
Compare
b5c9448
to
5d29834
Compare
2134746
to
0f361eb
Compare
0f361eb
to
4dbe7d8
Compare
5d29834
to
637598a
Compare
dac3d09
to
d833576
Compare
637598a
to
da199a3
Compare
d833576
to
9b2a66e
Compare
da199a3
to
837a80a
Compare
9b2a66e
to
4836fbb
Compare
837a80a
to
194d682
Compare
9dc3dee
to
abbd5b9
Compare
194d682
to
8f31fce
Compare
8f31fce
to
e07aba9
Compare
abbd5b9
to
706ce3c
Compare
e07aba9
to
6c4ad0f
Compare
706ce3c
to
34ab757
Compare
34ab757
to
9d1553e
Compare
6c4ad0f
to
0586bb2
Compare
9d2189f
to
d01cddb
Compare
9d1553e
to
699956f
Compare
9e35330
to
aa5bd68
Compare
699956f
to
cea4942
Compare
…isting filesystem
aa5bd68
to
d0abd34
Compare
cea4942
to
263dac6
Compare
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
TL;DR
Added support for encrypted filesystem-backed volumes in WEKA CSI using pre-existing KMS keys. This is an interim step between encryption using only a single cluster-wide key and a full-fledged automated key management per filesystem.
What changed?
How to test?
storageclass-wekafs-fs-encryption-key-in-secret.yaml
csi-wekafs-api-secret-kms-encryption-key-in-secret.yaml
pvc-wekafs-fs-encryption-key-in-secret.yaml
csi-app-on-fs-encryption-key-in-secret.yaml
Why make this change?
To enable secure data storage by supporting filesystem-level encryption in WEKA CSI, allowing users to protect their data using pre-existing KMS keys. This feature allows tenant separation by having different encryption keys and not only a cluster-wide key.