-
Notifications
You must be signed in to change notification settings - Fork 33
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
KubeClient & Core Data Protection #94
Comments
Hi - this sounds like a great idea :) I’m happy for you to open a PR if you would like to have a go at this (and am happy to help out if there’s anywhere you get stuck that I actually know something about). |
If you’re not sure how to start I could create a branch and sketch out the project structure so you could drop your code in)... |
Hey, thanks for the very fast answer :) If this works as expected, I will transfer it to a netstandard2.0 library. Many thanks! |
Soo, after the first few test.. The real Proleme here is that the IConfiguration contains the plain DataProtection Keys over the hole runtime and this could be a bad idea ;) For now, I start the implementation with the pure |
That seems to work well now. Here is my test repository: |
Wow - you work fast :) I'm happy to handle this 1 of 2 ways (although feel free to suggest something else if you have other preferences):
|
I'm a fan of monorepos ;-) |
Ok, I’ll have a go at integrating your code this weekend on a branch and get you do do a review when it’s ready. How’s that sound? |
What version of ASP.NET Core are you expecting to target? This will affect the library’s |
(technically |
I think it's good to support .NET Core 2.2. The target of In 3.0.0-preview9 they target both |
Good-o, I’ll get started on this first thing tomorrow (it’s 10pm here). |
many thanks for your effort! |
This code has been ported from https://github.com/rriverak/KubeClient.Extensions.DataProtection (thanks, @rriverak!). Note that, at this, stage, it is a work in progress (we need to decide on strategies for thread-safety and handling of common error conditions (such as the underlying Secret being deleted). Relates to #94.
…l elements represent key material) #94
Sorry this has taken so long, work’s been a bit crazy! I’m going to try to get this finished off over the weekend. |
Ok - I've published a build of the new package to the dev package feed (https://www.myget.org/F/dotnet-kube-client/api/v3/index.json). Would you mind trying out the package and letting me know if it works for you? You're looking for |
And, years later, this has finally been implemented; sorry it took so long 🙂 Published as |
Hey, thank you for this very handy client!
I currently have the need to enable Data Protection in my distributed dotnet application(s).
I would like to use native
Kubernetes Secrets
for this.A third-party
Secret-Vault
like HashiCorp Vault seems oversized to me.In my opinion, this scenario can be covered by Kubernetes alone.
A Package based on
KubeClient.Extensions.Configuration
could do that safely and quickly.I think we just need some GlueCode between DataProtection and KubeClient.
It would then end in an
KubeClient.Extensions.DataProtection
package.How can I contribute something like that?
or do you see something like this outside of this project?
The text was updated successfully, but these errors were encountered: