Server-Side Encryption and Encryption At Host support#1569
Server-Side Encryption and Encryption At Host support#1569mjudeikis merged 4 commits intoAzure:masterfrom
Conversation
d565233 to
63af9da
Compare
dea5a96 to
12dce2a
Compare
1dbe433 to
5252bca
Compare
5252bca to
9b30254
Compare
|
I'll create separate PRs for:
But this is already in a state where we can merge, I think. Want to keep PR small, relatively easy to review. Note that az cli enablement and documentation are not in scope of the work item. /azp run e2e |
| r.SubscriptionID, machineProviderSpec.NetworkResourceGroup, machineProviderSpec.Vnet, machineProviderSpec.Subnet, | ||
| ) | ||
|
|
||
| workerProfiles[i].EncryptionAtHost = machineProviderSpec.SecurityProfile != nil && |
There was a problem hiding this comment.
Interesting short version of this :)
|
Lets merge this post Arch discussion about E2E. This is something I would like to see in E2E. Maybe extend current tests to have this in? |
|
@mjudeikis while working on this I accidentaly broke all cluster creations without disk encryption set (non-priview APIs basically), but preview API was working. So I would be opposed to the idea of using preview API in the e2e at this stage. I suggest that we do not block this PR by the fact that we do not have a way to test different versions in e2s. I'm happy to create a separate task/subtast for this and work on it. |
|
@m1kola I think you right. We need separate story "E2E tests with new preview api" and we will have second flavor of e2e later. |
Relevant installer (fork) PR: jewzaam/installer-aro#5
Which issue this PR addresses:
Fixes work item №9586080.
What this PR does / why we need it:
Addds support for:
Test plan for issue:
Execute the following command to register the feature for your subscription (Not required in ARO dev sub):
Set basic variables
Create resource group for vnet, disk encryption set and cluster object
Resource group creation:
Vnet and subnets creation:
Create a cluster service principal
Make a note of
appIdandpassword.Grant network contributor to cluster service principal and first part service principal.
Create Key Vault
Create an instance of a DiskEncryptionSet
Grant the DiskEncryptionSet resource access to the key vault:
Grant cluster and First Party SP Reader permissions to DiskEncryptionSet
Create a dev cluster:
Check that all VMs have correct properties:
Note: you can run this command while bootstrap nodes still exist: they should have the same properties as set in
masterProfile.Is there any documentation that needs to be updated for this PR?
We need to (out of scope of this work item):