Bug 1804848
Summary: | [OSP 16.0.1] Volume encryption keys deleted when snapshotting instances created from images with cinder_encryption_key_id set | ||
---|---|---|---|
Product: | Red Hat OpenStack | Reporter: | Brian Rosmaita <brian.rosmaita> |
Component: | openstack-nova | Assignee: | Lee Yarwood <lyarwood> |
Status: | CLOSED DUPLICATE | QA Contact: | OSP DFG:Compute <osp-dfg-compute> |
Severity: | unspecified | Docs Contact: | |
Priority: | unspecified | ||
Version: | 16.0 (Train) | CC: | amcleod, dasmith, eglynn, jhakimra, kchamart, lyarwood, sbauza, sgordon, vromanso |
Target Milestone: | z1 | ||
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Known Issue | |
Doc Text: |
There is a known issue when all of the following conditions exist:
(0) You are using the OpenStack Train release (or code from master (Ussuri development))
(1) cinder_encryption_key_id and cinder_encryption_key_deletion_policy
are not included in the non_inheritable_image_properties setting in
nova.conf. These properties are not included by default.
(2) A user has created a volume of an encrypted volume-type in the Block
Storage service (cinder). For example, Volume-1.
(3) Using the Block Storage service, the user has uploaded the encrypted
volume as an image to the Image service (glance). For example, Image-1.
(4) Using the Compute service (nova), the user has attempted to
boot a server from the image directly. Note: this is an unsupported action, the
supported workflow is to use the image to boot-from-volume.
(5) Although an unsupported action, if a user does (4), it currently
results in a server in status ACTIVE but which is unusable because the
operating system cannot be found.
(6) Using the Compute service, the user requests the createImage action
on the unusable server, resulting in the creation of Image-2.
(7) Using the Image service, the user deletes Image-2 which has
inherited the cinder_encryption_key_* properties from Image-1 and the encryption key is deleted.
As a result, Image-1 is rendered non-decryptable so that it can no longer be used in the normal boot-from-volume workflow.
The workaround for this issue is to add the cinder_encryption_key_id,cinder_encryption_key_deletion_policy properties to the non_inheritable_image_properties option in the [DEFAULT] section of nova.conf. Image-2 can be deleted and the encryption key used by Image-1 remains available.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2020-02-21 10:17:46 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Brian Rosmaita
2020-02-19 18:19:30 UTC
See http://lists.openstack.org/pipermail/openstack-discuss/2020-February/012641.html for the complete write-up sent to the openstack mailing list. *** This bug has been marked as a duplicate of bug 1801255 *** |