-
Notifications
You must be signed in to change notification settings - Fork 92
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fulcio: AWS KMS support #831
Conversation
1217ba3
to
a065f07
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
can we please split the changes out into two PRs (one for fulcio, one for rekor)? otherwise the release logic won't be happy. |
Prior to this commit, the chart did not provide a way to supply AWS credentials for AWS KMS. This commit adds support for AWS KMS by allowing users to supply an AWS region ID and IAM credentials. AWS KMS users must specify the "cloudPlatform" parameter with a value of "aws" and specify "certificateAuthority" as "kmsca". The chart will then look for a kubernetes secret named by the "awsCredentialsSecret" parameter. The AWS region ID can be supplied using the newly-added "awsRegion" parameter. Signed-off-by: Stephen Fox <[email protected]>
ffa9a72
to
408e947
Compare
Hi @bobcallaway - I split the rekor changes out into this pull request: #832 I rebased the current pull request to be for fulcio only. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
one spelling nit but LGTM
ubernetes is the new kubernetes. Co-authored-by: Bob Callaway <[email protected]> Signed-off-by: sfox-equinix <[email protected]>
Description of the change
This commit adds support for AWS KMS keys to the fulcio chart. The following variables were added:
kmsType
- The KMS type (e.g.,aws
)awsKmsCredentialsSecretName
- The name of an existing Kubernetes secret containing the IAM credentials to authenticate with AWS KMSaccessKeyId
andsecretAccessKey
awsKmsRegion
- The AWS region string where the KMS key is hostedUsers must set
kmsType
to the valueaws
in order to use this feature.Existing or Associated Issue(s)
N/A
Additional Information
I tested these changes using a privately-hosted Sigstore instance. To use AWS KMS keys, users will need to supply the following changes via the values files:
kmsType
toaws
in values.yamlcertificateAuthority
to akmsca
in values.yamlkms_resource
to aawskms://
string in values.yamlkms_cert_chain
to a PEM blob containing the signers certificate (should be the first certificate in the file), optionally followed by any parent certificatesawsKmsRegion
to the desired region string in values.yamlawsKmsCredentialsSecretName
Checklist
Chart.yaml
according to semver. Where applicable, update and bump the versions in any associated umbrella chartvalues.yaml
and added to the README.md. The helm-docs utility can be used to generate the necessary content. Usehelm-docs --dry-run
to preview the content.ct lint
command. (**Note: This fails for me with the error:Error loading configuration: 'chart_schema.yaml' neither specified nor found in default locations
)