-
Notifications
You must be signed in to change notification settings - Fork 131
Open
Labels
feature proposalSuggest a feature to LiqoSuggest a feature to Liqo
Description
Describe the problem you are having (if any)
Currently, WireGuard key pairs and provider kubeconfigs are stored as Kubernetes Opaque Secrets. This requires manual creation and management steps, introduces operational overhead, and may not meet security policies that require centralized secret lifecycle controls and auditing.
Describe the solution you would like
Integration with external secret management systems such as HashiCorp Vault to automatically generate, rotate, and retrieve WireGuard keys and provider kubeconfigs without manual secret management.
Describe the user value of this feature
This would improve security posture, allow compliance with enterprise secret-management policies and reduce risk associated with poor key rotation or distribution practices.
Describe your proposed solution
Implement an optional backend integration that allows Liqo to:
- manage WireGuard key material via Vault or other CSI-compatible secret stores,
- manage remote kubeconfig credentials securely,
- optionally support automated key rotation flows.
Do you volunteer to implement this feature?
- I want to implement this feature
Code of Conduct
- I agree to follow this project's Code of Conduct
Metadata
Metadata
Assignees
Labels
feature proposalSuggest a feature to LiqoSuggest a feature to Liqo