-
Notifications
You must be signed in to change notification settings - Fork 24
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Allows users to specify unseal key shares and key threshold #63
Allows users to specify unseal key shares and key threshold #63
Conversation
bc0fb8e
to
3af8a42
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for the contribution, I tried out locally and worked as expected!
3af8a42
to
7120ed2
Compare
A much-awaited feature. Thank you @farhan-pasha!! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@farhan-pasha Thanks! I'm in favor of this PR as well.
Can you please take a look at my comment? I can proceed with merging the PR afterwards.
0d09b23
to
157ac05
Compare
…ed on their specific requirements. These configurations are made mode independent, providing users with better flexibility. The changes in this pull request also include modifications to the Custom Resource Definition (CRDs), a version bump, and updates to few example deployment YAML files. Fixes bank-vaults#56 Signed-off-by: Farhan Pasha <pfarhan@vmware.com>
157ac05
to
9f29194
Compare
Hey @sagikazarmark, @akijakya could you please have a look and possibly approve the PR. |
Overview
Allows users to specify unseal key shares and key threshold based on their specific requirements. The changes in this pull request also include modifications to the Custom Resource Definitions (CRDs), a version bump, and updates to a few example deployment YAML files.
Fixes #56
Notes for reviewer
This pull request introduces a different approach compared to PR-57, as this is mode independent(not just Kubernetes specific). Users will have the flexibility to utilize the
options
field inUnsealConfig
to specify their desired values.Thank you :)