#559 #543 F33 Self-Contained Change: Stratis 2.1.0
Merged 4 years ago by pbokoc. Opened 4 years ago by quiet.
Unknown source iss543  into  f33

@@ -3,3 +3,31 @@

  

  [[sect-storage]]

  = Storage

+ 

+ == Stratis 2.1.0

+ 

+ The latest version of the Stratis local storage management utility now supports per-pool encryption of devices that form a pool data tier. It is possible to encrypt the pool or to activate the pool's individual encrypted devices using a key in the kernel keyring.

+ 

+ The `stratisd` daemon of version 2.1.0 provides the following new D-Bus interfaces:

+ 

+ * `org.storage.stratis2.manager.r1` - Provides an extended `CreatePool` method to support an optional argument for encryption. Also, it supplies a number of methods for key management.

+ * `org.storage.stratis2.pool.r1` - Supports explicit initialization of a cache tier. Also, it supports a new `Encrypted` property.

+ * `org.storage.stratis2.FetchProperties.r1` - Supports an additional `HasCache` property.

+ * `org.storage.stratis2.Report.r1` - Supports a set of ad-hoc reports about Stratis. The interface and the names by which the reports can be accessed are not stable. Any report is only in the JSON format.

+ 

+ The `stratis` command-line utility of version 2.1.0, requires `stratisd` of the same version. Users can observe the following changes in `stratis`:

+ 

+ * The command for creating pools now allows also encryption.

+ * New pool `init_cache` command for initializing a cache.

+ * `key` is a new  sub-command for key management tasks.

+ * `report` is a new sub-command for displaying of reports generated by `stratisd`.

+ * The output of the `pool list` command now includes a *Properties* column. Each entry in this column is a string encoding the following properties of the pool:

+   ** Whether or not it has a cache.

+   ** Whether or not it is encrypted.

+ * All commands now verify that `stratis` is communicating with a compatible version of `stratisd`. If `stratisd` is of incompatible version, `stratis` will fail with an appropriate error.

+ 

+ The following are significant implementation details:

+ 

+ * Each block device in an encrypted pool's data tier is encrypted with a distinct, randomly chosen Media Encryption Key (MEK) on initialization.

+ * All devices from a single encrypted pool share a single passphrase that is supplied through the kernel keyring.

+ * This release requires the `cryptsetup` utility of version 2.3.

1 new commit added

  • fixup! Describes issue no.543
4 years ago

I applied SME feedback.

Pull-Request has been merged by pbokoc

4 years ago
Metadata