Dimitris Karakasilis fac5dfb32d Remove stubbed version and fix tests
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2025-09-24 14:32:21 +03:00
2022-10-08 22:53:00 +00:00
2025-09-22 15:56:32 +03:00
2022-10-13 20:34:44 +00:00
2025-09-24 10:44:32 +03:00
2024-07-11 17:51:49 +02:00
2024-01-25 12:40:14 +02:00
2022-10-13 20:34:44 +00:00
2024-07-11 17:51:49 +02:00
2025-09-18 14:29:48 +03:00
2023-03-29 14:33:29 +02:00
2025-09-24 13:58:17 +03:00
2025-09-24 13:58:17 +03:00
2022-10-09 00:30:32 +02:00
2022-10-13 20:34:44 +00:00
2025-09-24 13:58:17 +03:00
2024-07-11 18:01:41 +02:00


kairos-white-column 5bc2fe34
Kcrypt challenger

Kcrypt TPM challenger

license docs go report card

With Kairos you can build immutable, bootable Kubernetes and OS images for your edge devices as easily as writing a Dockerfile. Optional P2P mesh with distributed ledger automates node bootstrapping and coordination. Updating nodes is as easy as CI/CD: push a new image to your container registry and let secure, risk-free A/B atomic upgrades do the rest.

Documentation

Contribute

📚 Getting started with Kairos
💡 Examples
🎥 Video
👐Engage with the Community

🙌 CONTRIBUTING.md
🙋 GOVERNANCE
👷Code of conduct

This is experimental!

This is the Kairos kcrypt-challenger Kubernetes Native Extension.

Usage

See the documentation in our website: https://kairos.io/docs/advanced/partition_encryption/.

TPM NV Memory Cleanup

⚠️ DANGER: This command removes encryption passphrases from TPM memory! ⚠️ If you delete the wrong index, your encrypted disk may become UNBOOTABLE!

During development and testing, the kcrypt-challenger may store passphrases in TPM non-volatile (NV) memory. These passphrases persist across reboots and can accumulate over time, taking up space in the TPM.

To clean up TPM NV memory used by the challenger:

# Clean up the default NV index (respects config or defaults to 0x1500000)
kcrypt-discovery-challenger cleanup

# Clean up a specific NV index
kcrypt-discovery-challenger cleanup --nv-index=0x1500001

# Clean up with specific TPM device
kcrypt-discovery-challenger cleanup --tpm-device=/dev/tpmrm0

Safety Features:

  • By default, the command shows warnings and prompts for confirmation
  • You must type "yes" to proceed with deletion
  • Use --i-know-what-i-am-doing flag to skip the prompt (not recommended)

Note: This command uses native Go TPM libraries and requires appropriate permissions to access the TPM device.

Installation

To install, use helm:

# Adds the kairos repo to helm
$ helm repo add kairos https://kairos-io.github.io/helm-charts
"kairos" has been added to your repositories
$ helm repo update                                        
Hang tight while we grab the latest from your chart repositories...
...Successfully got an update from the "kairos" chart repository
Update Complete. ⎈Happy Helming!⎈

# Install the CRD chart
$ helm install kairos-crd kairos/kairos-crds
NAME: kairos-crd
LAST DEPLOYED: Tue Sep  6 20:35:34 2022
NAMESPACE: default
STATUS: deployed
REVISION: 1
TEST SUITE: None

# Installs challenger
$ helm install kairos-challenger kairos/kcrypt-challenger
Description
🔐 Kairos TPM encryption plugin
Readme Apache-2.0 19 MiB
Languages
Go 76.4%
Makefile 14.1%
Earthly 4.5%
Shell 4%
Dockerfile 1%