-
Notifications
You must be signed in to change notification settings - Fork 609
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[FEATURE] Support volume encryption for (encrypted) backing image volumes #7051
Comments
ExperimentsCreate Encrypted Volume with BackingImage - FAILED
|
ExperimentsCreate Encrypted Volume with Encrypted BackingImage - SUCCEEDED
|
Other ReferenceAWSAWS supports following three scenarios: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/AMIEncryption.html
Ceph
|
ExperimentsManually Encrypt a Non-encrypted Raw Backing Image - SUCCEEDED
Results
|
TODO
|
Pre Ready-For-Testing Checklist
Raw Image Encryption
apiVersion: longhorn.io/v1beta2
kind: BackingImage
metadata:
name: parrot-cloned-encrypted
namespace: longhorn-system
spec:
sourceType: clone
sourceParameters:
backing-image: parrot
encryption: encrypt
secret: longhorn-crypto
secret-namespace: longhorn-system
Qcow2 Image Encryption
PRs
|
Verified on master-head 20240708
The test steps Result passed Testing Items via
|
Is your feature request related to a problem? Please describe (👍 if you like this request)
Currently, Longhorn supports non-backing image volume encryption, and it is impossible to enable volume encryption for an unencrypted backing image. The goal here is to support volume encryption regardless of whether the volume is based on a backing image or not, with the potential condition being that the backing image is also encrypted using the same crypto key.
ref: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html#how-ebs-encryption-works
ref: https://gitlab.com/cryptsetup/cryptsetup/-/wikis/FrequentlyAskedQuestions
Describe the solution you'd like
When creating a first snapshot from the backing image, should be encrypted first.
Describe alternatives you've considered
Additional context
The text was updated successfully, but these errors were encountered: