-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Proposal: Create a new subproject for the HashiCorp Vault KMS plugin #26
Comments
LGTM. |
LGTM. |
LGTM |
For the repository, I'd like to propose that we should follow the same naming pattern Therefore, I would suggest both the plugin binary name and the repository name to be
Here's the output of $ notation plugin ls
NAME DESCRIPTION VERSION CAPABILITIES ERROR
hashicorp-vault Sign artifacts with keys in HashiCorp Vault v0.1.0+unreleased [SIGNATURE_GENERATOR.RAW] <nil> |
If the name |
|
LGTM though to be consistent I would say |
LGTM: Fully support additional providers. From a branding perspective, we should likely use |
@SteveLasker Nope, there is no coding restriction. It is just a "it's long" question. |
LGTM |
LGTM and agree with using a repository name which is more descriptive. We need to ensure, we have maintainers defined for this repo before we formally release any release candidate for this repo. |
LGTM for creating subproject. +1 on defining governance for new repo |
LGTM for subprojects creation. +1 on defining governance for any new repo |
Hey folks! 👋🏽 Kerim here, from @hashicorp. This is an exciting plugin and I'm grateful for the hard work y'all put in! I'd like to leave a 👍 for calling the plugin I believe from a naming perspective, while a few chars longer, this makes it more clear and avoids ambiguity. I appreciate the consideration :) |
+1 on notation-hashicorp-vault |
+1 +1 for the plugin name
|
If you need any support or advice from Hashicorp around Transit or KVv2, feel free to tag me. :-) Native x509 key storage is definitely something on my radar for Transit, I'll see if I can push it forwards internally. This would allow you to drop the kv-v2 dependency eventually. |
Thank you all for supporting this new project. We received the majority of approval from Notary maintainers. It's ready to create this new repo. We will have @OliverShang @patrickzheng200 @shizhMSFT @cipherboy as the initial maintainers. |
Close this issue since the repo |
@toddysm @notaryproject/notaryproject-org-maintainers Could pls you invite @cipherboy and @OliverShang to the Notary org so that we can add them to notation-hashicorp-vault plugin as initial maintainers? |
@FeynmanZhou Please create a PR in the respective repo to update the CODEOWNERS and MAINTAINERS files. This is the process we should follow to add them as maintainers for the repo. Org maintainers need to approve the new repo maintainers in the PR |
@toddysm Thanks. I reopened this issue and created a PR to add initial CODEOWNERS and MAINTAINERS as we proposed in this issue. |
@FeynmanZhou Just a note, I think the doc and this proposal could perhaps be better titled with I think there's also a chance for some better tutorials/documentation in the future here. The current advice to use a root token is great for getting started and trying it out, but ultimately we'll want to suggest using tokens scoped to the usage better (e.g., probably just to access whichever paths are used). As far as acquiring this token goes, at Hashicorp we tend to suggest using Vault Agent as a pattern for transparently accessing Vault without having to modify your application to care about different authentication methods. My 2c. is that this is definitely something that should be done for production usage, but something we can defer until later. Does notary support key management operations with these backends? E.g., key rotation, &c? |
Add initial CODEOWNERS and MAINTAINERS per discussion in notaryproject/.github#26. I hope @notaryproject/notaryproject-governance-maintainers @notaryproject/notaryproject-org-maintainers could help to review and approve this PR. Thanks! --------- Signed-off-by: Feynman Zhou <[email protected]>
Close this issue as the new repository "notation-hashicorp-vault" was created |
We had the plan to develop a HashiCorp Vault plugin for Notation based on the Notary Plugin spec, see issue notaryproject/notation-hashicorp-vault#8 . We see users requesting to use Notation with HashiCorp Vault several times. With the HashiCorp Vault plugin added to Notation, it would be helpful for the offline signing scenario and extend the Notation plugin ecosystem.
With the contributions from @OliverShang (LFX mentee) and @patrickzheng200 @shizhMSFT (LFX mentors) , the HashiCorp Vault KMS plugin has the prototype and document available to be reviewed now. The initial implementation is available at https://github.com/OliverShang/notation-hc-vault. The next step is to create a repository under Notary org and collaborate with other Notary maintainers to iterate on it. I propose using
vault-plugin
as the repository name.I propose the following members as the initial maintainers:
@notaryproject/notaryproject-governance-maintainers If you agree with creating a new repository for this plugin project, please comment below. Thanks!
The text was updated successfully, but these errors were encountered: