vmware: add image.yaml toggle for secure boot#2971
Conversation
|
IOW something more like: |
|
hmm. How common is it for users who use unsigned kernel modules? It would be nice if we could not go backwards with our defaults here. Is it possible for the user to change this knob if needed (similar to https://docs.fedoraproject.org/en-US/fedora-coreos/provisioning-vmware/#_modifying_ovf_metadata)? |
Yes, I'm testing this right now. Micah mentioned we did this templating for |
fe8b2a0 to
b9fabf9
Compare
b9fabf9 to
5dd323d
Compare
For RHCOS/OCP, apparently pretty darn common. ¯_(ツ)_/¯ The short list of vendors/partners that may be affected by something like this includes Calico, Intel, Nvidia, Portworx, Spectrumscale, Veritas...
In the case of customers doing IPI installs of OCP on vSphere, modifying the OVF metadata before installation is currently not possible. |
FWIW, I am pretty sure it wouldn't be hard to add a knob to openshift/installer to configure this; it already uses terraform to do a ton of stuff against their API. So that's a followup we can make; allow the users who do want Secure Boot to opt in. (OTOH, a counterargument is that Secure Boot for us currently is mostly a security theater, and we should revisit this when we actually support verifying at least all privileged userspace code too) |
How so? The purpose of Secure Boot is to protect the integrity of the kernel, and I'm not aware of anything that makes that less effective for FCOS. It's not trying to perform a fully verified boot. |
5dd323d to
2e78d16
Compare
|
|
|
Which behavior do we want as default? For other parameters we chose to use the values that we used before and overrode things in RHCOS/FCOS. Here we've already changed the default to enabled for all cases. I'd say we keep enabled the default? |
Add toggle for secure boot in the OVA. ref: https://bugzilla.redhat.com/show_bug.cgi?id=2106055
|
+1 to being secure by default |
2e78d16 to
16aaca2
Compare
|
I tested locally with FCOS (no override with default |
|
/retest |
|
RHCOS will keep failing until we have openshift/os#890 |
|
Let's not block though when we're reasonably confident (as we are in this case) that the FCOS CI covers things. |
|
@cgwalters: Overrode contexts on behalf of cgwalters: ci/prow/rhcos DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
@mike-nguyen: new pull request created: #2976 DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Uh oh!
There was an error while loading. Please reload this page.