No way to fall back to unencrypted config file for K8s encryption
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Kubernetes Control Plane Charm |
Triaged
|
Medium
|
Unassigned |
Bug Description
This came up in https:/
It may be that having an encrypted loopback device for the config file is unnecessary, such as if the LXD storage pool is encrypted or if the host machine is using full-disk encryption. The charm should not automatically fall back to not protecting the encryption key, but there should be some way for the admin to indicate that it is ok to proceed without the device, such as a config option.
Alternatively, if we can detect that we're running in LXD (I think we have logic for that somewhere) then we could just skip the Vaultlocker logic by default and rely on documentation to inform about the need for external protection of that config file.