-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Adds dm-crypt support #5739
Adds dm-crypt support #5739
Conversation
Adds crypt target support in kernel for device mapper Adds XTS support, AES cipher algorithms and User-space interface for symmetric key cipher algorithms in kernel Signed-off-by: Vasyl Purchel [email protected] Signed-off-by: Andrea Baglioni [email protected]
Welcome @vasyl-purchel! |
Thanks for your pull request. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). 📝 Please follow instructions at https://git.k8s.io/community/CLA.md#the-contributor-license-agreement to sign the CLA. It may take a couple minutes for the CLA signature to be fully registered; after that, please reply here with a new comment and we'll verify. Thanks.
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
Hi @vasyl-purchel. Thanks for your PR. I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Can one of the admins verify this patch? |
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: vasyl-purchel The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Codecov Report
@@ Coverage Diff @@
## master #5739 +/- ##
=======================================
Coverage 37.83% 37.83%
=======================================
Files 106 106
Lines 7773 7773
=======================================
Hits 2941 2941
Misses 4452 4452
Partials 380 380 |
Thanks for creating this PR ! would you mind giving some examples that this PR would be useful ? |
With the change I have created containers from https://github.com/ceph/ceph-csi/pull/697/files and then inside csi-rbdplugin container ( [root@minikube /]# echo 'hellopassphrase' | cryptsetup luksFormat --hash sha256 /dev/rbd0 -d /dev/stdin
[root@minikube /]# echo $?
0
[root@minikube /]# lsblk
NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT
rbd0 251:0 0 1G 0 disk
sr0 11:0 1 143.4M 0 rom
sda 8:0 0 19.5G 0 disk
`-sda1 8:1 0 19.5G 0 part /var/lib/kubelet/plugins
[root@minikube /]# echo 'hellopassphrase' | cryptsetup luksOpen /dev/rbd0 luks-encr-test -d /dev/stdin
[root@minikube /]# lsblk
NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT
rbd0 251:0 0 1G 0 disk
`-luks-encr-test 252:0 0 1020M 0 crypt
sr0 11:0 1 143.4M 0 rom
sda 8:0 0 19.5G 0 disk
`-sda1 8:1 0 19.5G 0 part /var/lib/kubelet/plugins While with the latest version I was getting: [root@minikube /]# echo 'hellopassphrase' | cryptsetup -q luksFormat --hash sha256 /dev/rbd0 -d /dev/stdin
device-mapper: reload ioctl on failed: Invalid argument
Failed to setup dm-crypt key mapping for device /dev/rbd0.
Check that kernel supports aes-xts-plain64 cipher (check syslog for more info). Also from cryptsetup documentation:
without change you get: [root@minikube /]# modprobe dm_crypt
modprobe: FATAL: Module dm_crypt not found. after the change: [root@minikube /]# modprobe dm-crypt
[root@minikube /]# echo $?
0 |
/check-cla |
@vasyl-purchel Do you have any issue while signing the cla? |
/check-cla |
1 similar comment
/check-cla |
/ok-to-test |
Diff was difficult to parse at first, but change looks good. Thank you! |
Adds crypt target support in kernel for device mapper
Adds XTS support, AES cipher algorithms and User-space interface for
symmetric key cipher algorithms in kernel
This change is needed to make it possible to encrypt rbd images in ceph-csi with LUKS
Signed-off-by: Vasyl Purchel [email protected]
Signed-off-by: Andrea Baglioni [email protected]