Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

gcp: Flag RHCOS with SECURE_BOOT and UEFI_COMPATIBLE #2921

Merged
merged 1 commit into from
Apr 3, 2020

Conversation

cgwalters
Copy link
Member

This opts us in to some of the features from
https://cloud.google.com/security/shielded-cloud/shielded-vm
Specifically with this, we get a vTPM device.

And what's nice about having a TPM device is that we can start
to optionally make use of TPM devices in OpenShift which
will then work on both bare metal and in GCP.

Closes: #2546

@openshift-ci-robot openshift-ci-robot added do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files. labels Jan 14, 2020
@cgwalters
Copy link
Member Author

Tested this locally and it worked; logging in with oc debug node I could use e.g. clevis encrypt tpm2.

However, the terraform-provider-google bump is a hack...I had to edit it slightly to work with our older Terraform.

So, this depends on a terraform bump which I haven't tried before.

@ashcrow
Copy link
Member

ashcrow commented Jan 14, 2020

However, the terraform-provider-google bump is a hack...I had to edit it slightly to work with our older Terraform.

IE the vendor bump is backported in the bump itself?

@cgwalters
Copy link
Member Author

IE the vendor bump is backported in the bump itself?

This bumps the terraform-provider-google plugin (that we vendor), which requires a newer api in terraform (which we also vendor). I just edited the google plugin to stop using that API (it's for specifying the user agent in HTTP requests).

@cgwalters
Copy link
Member Author

/retest

@darkmuggle
Copy link
Contributor

LGTM

Having TPM2 encryption support for RHCOS in GCP would be an excellent feature. Thank you @cgwalters for getting this done.

/approve

This opts us in to some of the features from
https://cloud.google.com/security/shielded-cloud/shielded-vm
Specifically with this, we get a vTPM device.

And what's nice about having a TPM device is that we can start
to optionally make use of TPM devices in OpenShift which
will then work on both bare metal *and* in GCP.

Closes: openshift#2546
@cgwalters
Copy link
Member Author

Rebased 🏄‍♂️ - we no longer need to bump terraform-providers/terraform-provider-google AFAICS. I didn't test this locally but will see what happens with the GCP run here.

@cgwalters
Copy link
Member Author

/test e2e-gcp

1 similar comment
@cgwalters
Copy link
Member Author

/test e2e-gcp

@@ -93,6 +93,14 @@ module "dns" {
resource "google_compute_image" "cluster" {
name = "${var.cluster_id}-rhcos-image"

# See https://github.com/openshift/installer/issues/2546
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

❤️ Thank you for linking to the issue!

@ashcrow ashcrow added size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. and removed size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files. labels Mar 26, 2020
@cgwalters cgwalters changed the title WIP: gcp: Flag RHCOS with SECURE_BOOT and UEFI_COMPATIBLE gcp: Flag RHCOS with SECURE_BOOT and UEFI_COMPATIBLE Mar 29, 2020
@openshift-ci-robot openshift-ci-robot removed the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label Mar 29, 2020
@cgwalters
Copy link
Member Author

OK, lifting WIP on this! Tested by launching with cluster-bot, and interactively using oc debug node/ again and using the tpm2_* tools.

The mess of test failures e.g. with openstack/ovirt/aws seems unrelated.
/retest

@ashcrow
Copy link
Member

ashcrow commented Mar 30, 2020

/retest

@cgwalters
Copy link
Member Author

ci/prow/e2e-gcp — Job succeeded.

Note.

@abhinavdahiya
Copy link
Contributor

/approve
/lgtm

@openshift-ci-robot openshift-ci-robot added the lgtm Indicates that a PR is ready to be merged. label Apr 3, 2020
@openshift-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: abhinavdahiya, ashcrow, darkmuggle

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci-robot openshift-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Apr 3, 2020
@openshift-bot
Copy link
Contributor

/retest

Please review the full test history for this PR and help us cut down flakes.

1 similar comment
@openshift-bot
Copy link
Contributor

/retest

Please review the full test history for this PR and help us cut down flakes.

@openshift-ci-robot
Copy link
Contributor

@cgwalters: The following tests failed, say /retest to rerun all failed tests:

Test name Commit Details Rerun command
ci/prow/e2e-aws-scaleup-rhel7 85270dd link /test e2e-aws-scaleup-rhel7
ci/prow/e2e-libvirt 85270dd link /test e2e-libvirt

Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. lgtm Indicates that a PR is ready to be merged. size/XS Denotes a PR that changes 0-9 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Add UEFI_COMPATIBLE and SECURE_BOOT to RHCOS on GCP
7 participants