Skip to content

Commit cae255b

Browse files
committed
review feedback
Signed-off-by: Anish Ramasekar <[email protected]>
1 parent 4e49369 commit cae255b

File tree

1 file changed

+13
-4
lines changed
  • keps/sig-auth/2907-secrets-store-csi-driver

1 file changed

+13
-4
lines changed

keps/sig-auth/2907-secrets-store-csi-driver/README.md

Lines changed: 13 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ Items marked with (R) are required *prior to targeting to a milestone / release*
7474

7575
## Summary
7676

77-
The [secrets-store-csi-driver](https://github.com/kubernetes-sigs/secrets-store-csi-driver) project provides a portable method for applications to consume secrets from external secret APIs through the filesystem. This effort was added to the `sig-auth` subproject in February 2020 and currently there are providers for Azure, AWS, GCP, and HashiCorp Vault. This KEP intends to cover making the core functionality of the driver GA.
77+
The [secrets-store-csi-driver](https://github.com/kubernetes-sigs/secrets-store-csi-driver) project provides a portable method for applications to consume secrets from external secret APIs through the filesystem. This effort was added to the `sig-auth` subproject in February 2020 and currently there are providers for Azure, AWS, GCP, and HashiCorp Vault. All the providers for the driver are out-of-tree. This KEP intends to cover making the core functionality of the driver GA.
7878

7979
## Motivation
8080

@@ -110,13 +110,13 @@ This project introduces a new Container Storage Interface (CSI) driver for fetch
110110

111111
### Notes/Constraints/Caveats (Optional)
112112

113-
Since the proposal is a storage driver, native support for presenting secrets to a process through environment variables is not possible.
113+
Since the proposal is a storage driver, native support for presenting secrets to a process through environment variables is not possible. In addition to the default mount, the driver also supports syncing the mounted content as Kubernetes secret. This is an optional feature and isn't enabled by default.
114114

115115
### Risks and Mitigations
116116

117117
#### Directory traversal vulnerabilities
118118

119-
The driver<->provider interface has been expanded to allow the driver to be the only process that actually writes files to the pod filesystem. The only hostpath provider's need are now the one for creating the unix socket used for communication with the driver process.
119+
The driver<->provider interface has been expanded to allow the driver to be the only process that actually writes files to the pod filesystem. The only hostpath providers need are now the one for creating the unix socket used for communication with the driver process.
120120

121121
The driver protects against directory traversal vulnerabilities by re-using the `atomic_writer` used by Kubernetes Secrets and ConfigMaps which includes protections against writing to unintended paths.
122122

@@ -208,7 +208,7 @@ Recall that end users cannot usually observe component logs or access metrics.
208208

209209
- `total_node_publish_error`
210210
- any rising count of this metric indicates a problem with mounting the volume for pod.
211-
- `total_node_publish_error`
211+
- `total_node_unpublish_error`
212212
- any rising count of this metric indicates a problem with unmounting the volume for pod.
213213

214214
<!--
@@ -250,8 +250,15 @@ implementation difficulties, etc.).
250250
- Supports windows containers (Kubernetes version v1.18+)
251251
- [KEP 1855: Service Account Token for CSI Driver](https://github.com/kubernetes/enhancements/tree/master/keps/sig-storage/1855-csi-driver-service-account-token)
252252

253+
The driver uses CSI Inline Volumes to mount the external secrets-store objects in the pod. The CSI Inline Volumes feature is enabled by default in Kubernetes 1.16+. For windows containers, the CSI Inline Volumes feature is enabled by default in Kubernetes 1.18+.
254+
255+
The minimum supported Kubernetes version is 1.16 for Linux and 1.18 for Windows.
256+
253257
###### Does this feature depend on any specific services running in the cluster?
254258

259+
- Kubelet
260+
- If kubelet service is not running, the pods referencing the csi driver for volume will fail to start.
261+
255262
<!--
256263
Think about both cluster-level services (e.g. metrics-server) as well
257264
as node-level agents (e.g. specific version of CRI). Focus on external or
@@ -269,6 +276,8 @@ and creating new ones, as well as about cluster-level services (e.g. DNS):
269276

270277
### Scalability
271278

279+
Load test results: https://secrets-store-csi-driver.sigs.k8s.io/load-tests.html
280+
272281
<!--
273282
For alpha, this section is encouraged: reviewers should consider these questions
274283
and attempt to answer them.

0 commit comments

Comments
 (0)