-
Notifications
You must be signed in to change notification settings - Fork 132
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for EBS volume encryption #663
Add support for EBS volume encryption #663
Conversation
@@ -509,6 +514,7 @@ func (p *provider) Create(machine *v1alpha1.Machine, data *cloudprovidertypes.Pr | |||
DeleteOnTermination: aws.Bool(true), | |||
VolumeType: aws.String(config.DiskType), | |||
Iops: config.DiskIops, | |||
Encrypted: pointer.BoolPtr(config.EBSVolumeEncrypted), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can we add an e2e test where this is enabled?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I ran the current e2e tests with this sat to true
and the tests are passed( I am not sure though if this change has any influence on the machine, e.g: the machine will not be provisioned). We can add another test with this enabled. WDYT?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
sgtm, but I don't think we need to test this on all kube versions and all distributions, one version on one distribution should be enough
@@ -33,6 +33,7 @@ spec: | |||
instanceProfile: "kubernetes-v1" | |||
diskSize: 50 | |||
diskType: "gp2" | |||
ebsVolumeEncrypted: false |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please also add this to the sample manifest in examples/
1a495a1
to
7c13573
Compare
@alvaroaleman PTAL |
So where is the green e2e run as requested? |
Signed-off-by: Moath Qasim <[email protected]>
7c13573
to
84a36d2
Compare
/test pull-machine-controller-e2e-aws-ebs-encryption-enabled |
|
.prow.yaml
Outdated
@@ -0,0 +1,26 @@ | |||
presubmits: | |||
######################################################### | |||
# unit tests |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Also no unittest. Other than that, looks good.
Signed-off-by: Moath Qasim <[email protected]> Signed-off-by: Moath Qasim <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
/approve
LGTM label has been added. Git tree hash: 1e3c2082299d634b4603454234e41ef02a5ba65a
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: alvaroaleman, moadqassem The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
What this PR does / why we need it:
This indicates whether the encryption state of an EBS volume is changed while being restored from a backing snapshot.
Which issue(s) this PR fixes
Fixes #