Feature Request
For Confidential Computing use cases, we want to add support for setting up LUKS for the root device using a key that is fetched from a remote server as part of a remote attestation procedure. In our use case, we will be using trustee: https://github.com/confidential-containers/trustee.
Environment
What hardware/cloud provider/hypervisor is being used to run Ignition?
We will start with QEMU & Azure, and will likely extend to Bare Metal, GCP, AWS, etc.
Desired Feature
Add an entry to Ignition spec to tell it to use trustee to do fetch the key to setup LUKS for the root device.
Example Butane config:
variant: fcos
version: 1.7.0-experimental
boot_device:
luks:
trustee:
- https://...
- https://...
Ignition:
{
"ignition": {
"version": "3.6.0-experimental"
},
"storage": {
"filesystems": [
{
"device": "/dev/mapper/root",
"format": "xfs",
"label": "root",
"wipeFilesystem": true
}
],
"luks": [
{
"trustee": [
"https://...",
"https://..."
],
"device": "/dev/disk/by-partlabel/root",
"label": "luks-root",
"name": "root",
"wipeVolume": true
}
]
}
}
Other Information
See: https://github.com/confidential-clusters/investigations
Feature Request
For Confidential Computing use cases, we want to add support for setting up LUKS for the root device using a key that is fetched from a remote server as part of a remote attestation procedure. In our use case, we will be using trustee: https://github.com/confidential-containers/trustee.
Environment
What hardware/cloud provider/hypervisor is being used to run Ignition?
We will start with QEMU & Azure, and will likely extend to Bare Metal, GCP, AWS, etc.
Desired Feature
Add an entry to Ignition spec to tell it to use trustee to do fetch the key to setup LUKS for the root device.
Example Butane config:
Ignition:
Other Information
See: https://github.com/confidential-clusters/investigations