swap volume not blocked between an unencrypted and encrypted volume while using QEMU to natively decrypt
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
OpenStack Compute (nova) |
Fix Released
|
Medium
|
Lee Yarwood | ||
Queens |
Fix Committed
|
Medium
|
Lee Yarwood |
Bug Description
Description
===========
The original check [1] introduced in Queens only handles cases where we are swapping from an encrypted LUKS volume and does not handle swapping from an unencrypted volume into an encrypted LUKS volume. This still needs to be blocked pending additional QEMU/libvirt wiring to allow data to be rebased into an encrypted LUKS disk while using QEMU to natively read and write to the disk.
[1] https:/
Steps to reproduce
==================
Swap between an unencrypted volume to a LUKS encrypted volume in >=Queens with the native QEMU decryption requirements met (QEMU >=2.6 and Libvirt >=2.2.0 ).
Expected result
===============
This is blocked by n-cpu with a NotImplementedError raised.
Actual result
=============
This is allowed but ultimately fails due to Libvirt being unable to rebase into the encrypted disk.
summary: |
- swap volume not blocked between an decrypted and encrypted volume while - using QEMU to natively decrypt + swap volume not blocked between an unencrypted and encrypted volume + while using QEMU to natively decrypt |
description: | updated |
Changed in nova: | |
importance: | Undecided → Medium |
tags: | added: libvirt volumes |
Fix proposed to branch: master /review. openstack. org/544238
Review: https:/