|
85 | 85 | files. Those get added to the service config dir in /etc/<service> |
86 | 86 | . TODO: -> implement' |
87 | 87 | type: object |
| 88 | + enabledSecretStores: |
| 89 | + items: |
| 90 | + description: This SecretStore type is used by the EnabledSecretStores |
| 91 | + variable inside the specification. |
| 92 | + enum: |
| 93 | + - simple_crypto |
| 94 | + - pkcs11 |
| 95 | + type: string |
| 96 | + maxItems: 2 |
| 97 | + minItems: 1 |
| 98 | + type: array |
| 99 | + globalDefaultSecretStore: |
| 100 | + default: simple_crypto |
| 101 | + description: This SecretStore type is used by the EnabledSecretStores |
| 102 | + variable inside the specification. |
| 103 | + enum: |
| 104 | + - simple_crypto |
| 105 | + - pkcs11 |
| 106 | + type: string |
88 | 107 | networkAttachments: |
89 | 108 | description: NetworkAttachments is a list of NetworkAttachment resource |
90 | 109 | names to expose the services to the given network |
@@ -114,6 +133,113 @@ spec: |
114 | 133 | default: SimpleCryptoKEK |
115 | 134 | type: string |
116 | 135 | type: object |
| 136 | + pkcs11: |
| 137 | + description: BarbicanPKCS11Template - Includes all common HSM properties |
| 138 | + properties: |
| 139 | + AESGCMGenerateIV: |
| 140 | + default: true |
| 141 | + description: Generate IVs for CKM_AES_GCM mechanism |
| 142 | + type: boolean |
| 143 | + HMACKeyType: |
| 144 | + default: CKK_GENERIC_SECRET |
| 145 | + description: HMAC Key Type |
| 146 | + type: string |
| 147 | + HMACKeygenMechanism: |
| 148 | + default: CKM_GENERIC_SECRET_KEY_GEN |
| 149 | + description: HMAC Keygen Mechanism |
| 150 | + type: string |
| 151 | + HMACLabel: |
| 152 | + description: Label to identify HMAC key in the HSM (must not be |
| 153 | + the same as MKEK label) |
| 154 | + type: string |
| 155 | + HMACMechanism: |
| 156 | + default: CKM_SHA256_HMAC |
| 157 | + description: HMAC Mechanism. This replaces hsm_keywrap_mechanism |
| 158 | + type: string |
| 159 | + MKEKLabel: |
| 160 | + description: Label to identify master KEK in the HSM (must not |
| 161 | + be the same as HMAC label) |
| 162 | + type: string |
| 163 | + MKEKLength: |
| 164 | + default: 32 |
| 165 | + description: Length in bytes of master KEK |
| 166 | + type: integer |
| 167 | + OSLockingOK: |
| 168 | + default: false |
| 169 | + description: Set os_locking_ok |
| 170 | + type: boolean |
| 171 | + alwaysSetCKASensitive: |
| 172 | + default: true |
| 173 | + description: Always set cka_sensitive |
| 174 | + type: boolean |
| 175 | + certificatesMountPoint: |
| 176 | + description: The mounting point where the certificates will be |
| 177 | + copied to (e.g., /usr/local/luna/config/certs). |
| 178 | + type: string |
| 179 | + certificatesSecret: |
| 180 | + description: The OpenShift secret that stores the HSM certificates. |
| 181 | + type: string |
| 182 | + clientAddress: |
| 183 | + description: The IP address of the client connecting to the HSM |
| 184 | + (X.Y.Z.K) |
| 185 | + type: string |
| 186 | + encryptionMechanism: |
| 187 | + default: CKM_AES_GCM |
| 188 | + description: Secret encryption mechanism |
| 189 | + type: string |
| 190 | + keyWrapGenerateIV: |
| 191 | + default: true |
| 192 | + description: Generate IVs for the key wrap mechanism |
| 193 | + type: boolean |
| 194 | + keyWrapMechanism: |
| 195 | + default: CKM_AES_KEY_WRAP_KWP |
| 196 | + description: Key wrap mechanism |
| 197 | + type: string |
| 198 | + libraryPath: |
| 199 | + description: Path to vendor's PKCS11 library |
| 200 | + type: string |
| 201 | + loggingLevel: |
| 202 | + default: 4 |
| 203 | + description: Level of logging, where 0 means "no logging" and |
| 204 | + 7 means "debug". |
| 205 | + maximum: 7 |
| 206 | + minimum: 0 |
| 207 | + type: integer |
| 208 | + loginSecret: |
| 209 | + description: OpenShift secret that stores the password to login |
| 210 | + to the PKCS11 session |
| 211 | + type: string |
| 212 | + serverAddress: |
| 213 | + description: The HSM's IPv4 address (X.Y.Z.K) |
| 214 | + type: string |
| 215 | + slotId: |
| 216 | + description: One of TokenSerialNumber, TokenLabels or SlotId must |
| 217 | + be defined. SlotId is used if none of the others is defined |
| 218 | + type: string |
| 219 | + tokenLabels: |
| 220 | + description: Token labels used to identify the token to be used. |
| 221 | + One of TokenSerialNumber, TokenLabels or SlotId must be specified. |
| 222 | + TokenLabels takes priority over SlotId. This can be a comma |
| 223 | + separated string of labels |
| 224 | + type: string |
| 225 | + tokenSerialNumber: |
| 226 | + description: Token serial number used to identify the token to |
| 227 | + be used. One of TokenSerialNumber, TokenLabels or SlotId must |
| 228 | + be defined. TokenSerialNumber takes priority over TokenLabels |
| 229 | + and SlotId |
| 230 | + type: string |
| 231 | + type: |
| 232 | + description: 'A string containing the HSM type (currently supported: |
| 233 | + "luna").' |
| 234 | + type: string |
| 235 | + required: |
| 236 | + - HMACLabel |
| 237 | + - MKEKLabel |
| 238 | + - libraryPath |
| 239 | + - loginSecret |
| 240 | + - serverAddress |
| 241 | + - type |
| 242 | + type: object |
117 | 243 | rabbitMqClusterName: |
118 | 244 | default: rabbitmq |
119 | 245 | description: RabbitMQ instance name Needed to request a transportURL |
|
0 commit comments