-
Notifications
You must be signed in to change notification settings - Fork 854
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enable secret rotation on Prow without sharing it in plain text #1673
Comments
/kind feature There are a few parts here:
I'm going to work on the first part since I'm working on writing up some kind of prow playbook in general, and may have time to try a sample PR to demonstrate the second part. Setting up secret syncing is going to take more bandwidth than I have to offer for at least the next two weeks, though I'm happy to assist/empower anyone who wants to try |
Thanks for the detailed response, really appreciate it.
Thanks for leading this. Let me know if there is anything I can help.
We use the label
I will bake some of our jobs in k8s-infra-prow-build to make sure nothing breaks before moving all of our jobs there.
This would be ideal. I will focus on the above three bullet points before jumping into this one. |
#1731 to cover the first part |
kubernetes/test-infra#21484 enabled prow cluster secrets synced from google secret manager and other secret manager providers. kubernetes/test-infra#21610 adds more instructions to make it more clear how clients can rotate secrets by themselves |
/milestone v1.21 |
Sub-issue of #1637.
We would like to explore different ways to perform secret rotation without sharing it in plain text. Based on the wg-k8s-infra meeting on Feb 17, 2021, we discussed moving Azure ProwJobs from the default Prow build cluster (owned by Google) to a community build cluster and setting up IAM roles so that core contributors from Azure can perform secret rotation by ourselves.
/cc @spiffxp
The text was updated successfully, but these errors were encountered: