-
Epic
-
Resolution: Unresolved
-
Critical
-
None
-
None
-
None
Epic Goal
Provide docs on how secrets that are managed by Vault could be consumed in a Tekton Pipelines as credentials (git, image registry, etc), certificates, etc.
OpenShift integrates with vault through the Secrets Store CSI Driver and External Secrets which could be used within a Tekton Pipeline for accessing pulling sensitive data from Vault.
Why is this important?
To enable customers who use Vault for secret management to consume those secrets within the CI/CD pipelines
Scenarios
- Git credentials
- Image registry credentials
- Third-party service credentials
- Certificates?
Acceptance Criteria (Mandatory)
- CI - MUST be running successfully with tests automated
- Release Technical Enablement - Provide necessary release enablement details and documents.
Dependencies (internal and external)
NA
Previous Work (Optional):
NA
Open questions::
None
Done Checklist
- Acceptance criteria are met
- Non-functional properties of the Feature have been validated (such as performance, resource, UX, security or privacy aspects)
- User Journey automation is delivered
- Support and SRE teams are provided with enough skills to support the feature in production environment
- is related to
-
OCPSTRAT-1782 OpenShift integration with external secret managers (Vault)
- New