Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1419556 - [RFE] Full Barbican support in Swift
[RFE] Full Barbican support in Swift
Status: CLOSED ERRATA
Product: Red Hat OpenStack
Classification: Red Hat
Component: openstack-swift (Show other bugs)
12.0 (Pike)
Unspecified Unspecified
high Severity unspecified
: Upstream M3
: 13.0 (Queens)
Assigned To: Thiago da Silva
Mike Abrams
Kim Nylander
: FutureFeature, Triaged
Depends On: 1333141 1558058
Blocks: 1433715
  Show dependency treegraph
 
Reported: 2017-02-06 08:49 EST by Thiago da Silva
Modified: 2018-06-27 09:30 EDT (History)
16 users (show)

See Also:
Fixed In Version: openstack-swift-2.17.1-0.20180226191257.3d12a10.el7ost openstack-tripleo-heat-templates-8.0.2-11.el7ost puppet-swift-12.3.1-0.20180221111701.5bdce0a.el7ost puppet-tripleo-8.3.0-0.20180222131528.3202394.el7ost
Doc Type: Enhancement
Doc Text:
The Object Store service (swift) can now integrate with Barbican to transparently encrypt and decrypt your stored (at-rest) objects. At-rest encryption is distinct from in-transit encryption and refers to the objects being encrypted while being stored on disk. Swift objects are stored as clear text on disk. These disks can pose a security risk if not properly disposed of when they reach end-of-life. Encrypting the objects mitigates that risk. Swift performs these encryption tasks transparently, with the objects being automatically encrypted when uploaded to swift, then automatically decrypted when served to a user. This encryption and decryption is done using the same (symmetric) key, which is stored in Barbican.
Story Points: ---
Clone Of: 1418439
Environment:
Last Closed: 2018-06-27 09:29:18 EDT
Type: Bug
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
OpenStack gerrit 364878 None master: MERGED swift: Retrieve encryption root secret from Barbican (I1700e997f4ae6fa1a7e68be6b97539a24046e80b) 2018-05-03 14:54 EDT
OpenStack gerrit 525321 None master: MERGED puppet-swift: Adding barbican configuration to swift (I78c6003f5f599a422193dc47422ee607ce05c715) 2018-05-03 14:54 EDT
OpenStack gerrit 525323 None master: MERGED puppet-tripleo: Include barbican modules to swift proxy (I1ceda973733acb081967ab04a5fd57eb1609c9a7) 2018-05-03 14:54 EDT
OpenStack gerrit 525324 None master: MERGED tripleo-heat-templates: Add new encryption middleware to swift proxy (I26cf063fe410689530ee507cc2f79e93b5e71732) 2018-05-03 14:53 EDT
OpenStack gerrit 565159 None stable/queens: MERGED tripleo-heat-templates: Add DeployIdentifier to Swift set_swift_secret container (I683bb9e96eef73a014d5967a5930ef519ac34... 2018-05-03 14:53 EDT
Red Hat Product Errata RHEA-2018:2086 None None None 2018-06-27 09:30 EDT

  None (edit)
Comment 1 Red Hat Bugzilla Rules Engine 2017-02-06 08:49:50 EST
This bugzilla has been removed from the release and needs to be reviewed and Triaged for another Target Release.
Comment 2 Red Hat Bugzilla Rules Engine 2017-02-08 04:29:47 EST
This bugzilla has been removed from the release and needs to be reviewed and Triaged for another Target Release.
Comment 16 Kim Nylander 2018-06-19 22:50:29 EDT
If this bug requires doc text for errata release, please set the 'Doc Type' and provide draft text according to the template in the 'Doc Text' field.

The documentation team will review, edit, and approve the text.

If this bug does not require doc text, please set the 'requires_doc_text' flag to -.

Please note that the errata is due this week.
Comment 17 Kim Nylander 2018-06-20 14:11:13 EDT
Thank you for adding the doc text.
Comment 19 errata-xmlrpc 2018-06-27 09:29:18 EDT
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHEA-2018:2086

Note You need to log in before you can comment on or make changes to this bug.