-
Notifications
You must be signed in to change notification settings - Fork 431
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Secure bootstrapping for capz machines #2189
Conversation
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
8c3c498
to
0e6debc
Compare
@shysank: The following test failed, say
Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
/test pull-cluster-api-provider-azure-e2e-exp |
@shysank I haven't gone through the code yet but just from looking at the PR description, my initial questions are:
Perhaps it would make sense to start with a design proposal since this is such a big change/feature. |
The goal of this pr is to provide a way to improve the security of bootstrapping mechanism that leverage cloud init only; bring capz on par with capa in terms of bootstrap data security albeit with some limitations (as mentioned in the pr description). This is not a generic solution to support other cloud initializers, perhaps we could implement
I'll work on creating a design proposal. |
@shysank: PR needs rebase. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
@CecileRobertMichon are you able to assess if we should try to salvage this PR? |
I believe @sonasingh46 was looking into it https://kubernetes.slack.com/archives/CEX9HENG7/p1658756031736239 Regardless, we should start with a proposal as noted above and open a new PR once we're ready. /close |
@CecileRobertMichon: Closed this PR. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
I will work to raise a proposal PR for this. |
What type of PR is this?
/kind feature
What this PR does / why we need it:
This PR provides an option to secure bootstrap data for capz machines. This is similar to the way capa works right now. On a high level, it works as follows: If
SecureBootstrapEnabled
is set to true,If
SecureBootstrapEnabled
is set to false (or not set), there is no change with the current behaviour.Limitations:
SecureBootstrapEnabled
works for the whole cluster, and not for individual machines (unlike capa). This is because we need to create a KeyVault for managing secrets, and doing it at the machine level will be too cumbersome. We could probably add an override at machine level to disable secure bootstrapping.** Credits to @randomvariable and the CAPA team for the original implementation **
Which issue(s) this PR fixes (optional, in
fixes #<issue number>(, fixes #<issue_number>, ...)
format, will close the issue(s) when PR gets merged):Fixes #915 (partially)
Special notes for your reviewer:
I have split the pr into logical commits for easier review.
Please confirm that if this PR changes any image versions, then that's the sole change this PR makes.
TODOs:
Release note: