enhancements: CoreOS Encrypted Disks By Default doc is not clear enough for installer changes
The installer team was looking at implementing the https://github.com/openshift/enhancements/blob/a3411e6f3458743ee2f84b013101d584fc272dc8/enhancements/automated-policy-based-disencryption.md#installer-support section, but the section is very brief in details that would allow somebody to implement the requested feature.
Here are some of the high-level questions that probably should be answered…
A) The installer can only provide the configurastion for nodes in form of MachineConfig objects. Therefore it would be highly useful there were example for MachineConfig objects that would define the encryption setting:
i) default (disable: false, enforce: true) ii) tpm2 based iii) tang based, multiple tang servers based iv) custom user based
B) The specs allow tpm2, tang etc. as source for encryption setup source, but there are no links or definition of valid values for these options.
C) The spec says the default is disable: false, enforce: true
that’s not a backward compatible change for install-config.yaml users, because users today expect to have no encryption…?
D) lack of clarity for default on cloud platforms.\
https://github.com/openshift/enhancements/blob/b5e77b5a99dc19de9acfa27fb0758ca42d74f3ee/enhancements/automated-policy-based-disencryption.md#policies
is also not clear on the defaults for cloud like AWS, Azure, GCP…
About this issue
- Original URL
- State: closed
- Created 5 years ago
- Comments: 32 (27 by maintainers)
A couple things concern me about enabling it on vSphere:
With those requirements I think that default disabled is more appropriate.
cc: @dav1x