Merged
Conversation
Signed-off-by: dereknola <derek.nola@suse.com>
Signed-off-by: dereknola <derek.nola@suse.com>
Signed-off-by: dereknola <derek.nola@suse.com>
Signed-off-by: dereknola <derek.nola@suse.com>
Signed-off-by: dereknola <derek.nola@suse.com>
Signed-off-by: dereknola <derek.nola@suse.com>
Signed-off-by: dereknola <derek.nola@suse.com>
Signed-off-by: dereknola <derek.nola@suse.com>
Signed-off-by: dereknola <derek.nola@suse.com>
Signed-off-by: dereknola <derek.nola@suse.com>
Signed-off-by: dereknola <derek.nola@suse.com>
Signed-off-by: dereknola <derek.nola@suse.com>
Signed-off-by: dereknola <derek.nola@suse.com>
Signed-off-by: dereknola <derek.nola@suse.com>
Signed-off-by: dereknola <derek.nola@suse.com>
Signed-off-by: dereknola <derek.nola@suse.com>
Signed-off-by: dereknola <derek.nola@suse.com>
Signed-off-by: dereknola <derek.nola@suse.com>
Signed-off-by: dereknola <derek.nola@suse.com>
Signed-off-by: dereknola <derek.nola@suse.com>
Signed-off-by: dereknola <derek.nola@suse.com>
…o encryption_app
Signed-off-by: dereknola <derek.nola@suse.com>
Signed-off-by: dereknola <derek.nola@suse.com>
Signed-off-by: dereknola <derek.nola@suse.com>
8ca7cda to
757b464
Compare
brandond
reviewed
Nov 30, 2021
Signed-off-by: Derek Nola <derek.nola@suse.com>
Signed-off-by: Derek Nola <derek.nola@suse.com>
Signed-off-by: Derek Nola <derek.nola@suse.com>
Signed-off-by: Derek Nola <derek.nola@suse.com>
Signed-off-by: Derek Nola <derek.nola@suse.com>
Signed-off-by: Derek Nola <derek.nola@suse.com>
brandond
requested changes
Dec 7, 2021
Signed-off-by: Derek Nola <derek.nola@suse.com>
brandond
requested changes
Dec 7, 2021
Signed-off-by: Derek Nola <derek.nola@suse.com>
Signed-off-by: Derek Nola <derek.nola@suse.com>
Signed-off-by: Derek Nola <derek.nola@suse.com>
brandond
requested changes
Dec 7, 2021
Signed-off-by: Derek Nola <derek.nola@suse.com>
brandond
approved these changes
Dec 7, 2021
dereknola
added a commit
to dereknola/k3s
that referenced
this pull request
Dec 7, 2021
Signed-off-by: Derek Nola <derek.nola@suse.com>
dereknola
added a commit
that referenced
this pull request
Dec 7, 2021
This was referenced Dec 7, 2021
|
Verified in k3s with master commit d71b335 and RC with single node and 3 node cluster following the steps described in the ticket and observed the expected test results 3 node cluster Prepare stage: After restarts on all 3 nodes Rotate stage: After restarts on all 3 nodes Reencrypt stage: After restarts on all 3 nodes |
This was referenced Dec 15, 2021
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Proposed Changes
Introduces new feature: secrets-encryption keys rotation and enable/disable of encryption. The is all controlled via a new sub command
k3s secrets-encrypt. Documentation can be found at https://rancher.com/docs/k3s/latest/en/security/secrets_encryption/Types of Changes
New Feature
New Integration Test (covers single node)
Verification
Formal documentation to follow:
You can run
k3s secrets-encrypt statusat any time to see the current stage/state of encryptionFor a single node cluster:
k3s server --secrets-encryptionk3s secrets-encrypt preparek3s secrets-encrypt status, note, the addition of a new keyk3s secrets-encrypt rotatek3s secrets-encrypt status, note the keys swapk3s secrets-encrypt reencryptFor external DB:
Start up a external DB (I used mySQL for this)
Start up 3 K3s servers joined to mySQL
k3s server --secrets-encryption --datastore-endpoint "mysql://root:mysql@tcp(192.168.1.200:3306)/k3s"Select ONE server (S1 going forward) to perform the rotate on (doing any stage on any server is supported)
Run
k3s secrets-encrypt prepareon S1Restart S1 with same arguments
Once S1 is back up, restart the other two servers
Call
k3s secrets-encrypt statuson S1 and S2, info should be the same on bothRun
k3s secrets-encrypt rotateon S1Restart S1
Once S1 is back up, restart the other two servers
Call
k3s secrets-encrypt statuson S1 and S2, info should be the same on bothRun
k3s secrets-encrypt reencrypton S1Restart S1
Once S1 is back up, restart the other two servers
Call
k3s secrets-encrypt statuson S1 and S2, info should be the same on bothLinked Issues
#4254
#3407
User-Facing Change
Further Comments