Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Sync certificates without mounting a volume #1565

Open
Basssiiie opened this issue May 17, 2024 · 1 comment
Open

Sync certificates without mounting a volume #1565

Basssiiie opened this issue May 17, 2024 · 1 comment
Labels
enhancement New feature or request

Comments

@Basssiiie
Copy link

Basssiiie commented May 17, 2024

Describe the solution you'd like
Hello, currently it seems you have to mount a SecretProviderClass to a pod before it starts creating Kubernetes secrets. Would it be possible to have a SecretProviderClass be synced even without a pod or a volume mount?

Our use case is that we want to sync our wildcard certificate once for all apps/ingresses in the namespace that use it, without having to pick a specific app that will do have the side effect of ensuring the certificate is present in the namespace. This also allows us to have one specific managed identity/workload identity accessing the key vault for that certificate, instead of having different apps with different identities all have access to the same key vault.

Thank you for your time. :)

Environment:

  • Secrets Store CSI Driver version: (use the image tag): v1.4.3
  • Azure Key Vault provider version: (use the image tag): v1.5.2
  • Kubernetes version: (use kubectl version): v1.25.9
  • Cluster type: (e.g. AKS, aks-engine, etc): AKS
@Basssiiie Basssiiie added the enhancement New feature or request label May 17, 2024
@geowalrus4gh
Copy link

geowalrus4gh commented Dec 5, 2024

This issue is critical in our scenario. Application architecture and security practices enforces us from any application not keep/accept secrets or key via volume mount or pod env variable. Applications must read secret values from k8s secret directly using k8s APIs.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants