Uploaded image for project: 'OpenShift Storage'
  1. OpenShift Storage
  2. STOR-875

Implement custom keys in AWS EBS CSI driver operator

    XMLWordPrintable

Details

    • Story
    • Resolution: Done
    • Undefined
    • None
    • None
    • None
    • Storage Sprint 230, Storage Sprint 231, Storage Sprint 232

    Description

      User Story:

      As a cluster admin, I want OCP to provision new volumes with my custom encryption key that I specified during cluster installation in install-config.yaml so all OCP assets (PVs, VMs & their root disks) use the same encryption key.

      Acceptance Criteria:

      Description of criteria:

      • Check that dynamically provisioned PVs use the key specified in install-config.yaml
      • Check that the key can be changed in TBD API and all volumes newly provisioned after the key change use the new key. (Exact API is not defined yet, probably a new field in `Infrastructure`, calling it TBD API now).

      (optional) Out of Scope:

      Re-encryption of existing PVs with a new key. Only newly provisioned PVs will use the new key.

      Engineering Details:

      Enhancement (incl. TBD API with encryption key reference) will be provided as part of https://issues.redhat.com/browse/CORS-2080.

      "Raw meat" of this story is translation of the key reference in TBD API to StorageClass.Parameters. AWS EBS CSi driver operator should update both the StorageClass it manages (managed-csi) with:

      Parameters:
          encrypted: "true"

          kmsKeyId:  "arn:aws:kms:us-east-1:012345678910:key/abcd1234-a123-456a-a12b-a123b4cd56ef"

      Upstream docs: https://github.com/kubernetes-sigs/aws-ebs-csi-driver/blob/master/docs/parameters.md 

      Attachments

        Activity

          People

            jdobson@redhat.com Jonathan Dobson
            rhn-engineering-jsafrane Jan Safranek
            Votes:
            0 Vote for this issue
            Watchers:
            3 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved: