4f4cc4c847
During ansible bootstrap, encryption-provider.yaml was copied to '/opt/platform/config/<version>/kubernetes' directory from '/etc/kubernetes'. After supporting luks volume, this file is moved to the luks volume and symlink is created at '/etc/kubernetes' and '/opt/platform/config/<version>/kubernetes' pointing to encryption-provider.yaml file in the luks volume. After ansible bootstrap completes, controllerconfig service tries to copy the files from '/opt/platform/config/<version>/kubernetes' to '/etc/kubernetes'. So it tries to copy encryption-provider.yaml as well which is a symlink of a file in luks volume. This change adds an argument '-P' to to the 'cp' command which avoid copying the source content from the symlink pointing to the luks volume. This change is required as the luks volume may not be accessible while it is getting copied. The directory for which this '-P' option is applied contains only one symlink which is 'encryption-provider.yaml', so there is no negative impact. Test Plan: PASS: build-pkgs -c -p controllerconfig PASS: AIO-SX bootstrap should pass and host should come to unlocked/enabled/available state PASS: Verify if a symlink encryption-provider.yaml is copied at '/etc/kubernetes/' location after host-unlock. PASS: Verify if the below file is accessible /var/luks/stx/luks_fs/controller/etc/kubernetes/ encryption-provider.yaml from symlink in /etc/kubernetes/ PASS: Standard setup- Verify if a symlink encryption-provider.yaml is copied at '/etc/kubernetes/' on both controllers. PASS: Standard setup- Verify if a symlink encryption-provider.yaml is present at '/opt/platform/config/<version>/kubernetes/' on conroller-1 after 'system host-swact 1' PASS: Standard setup- lock/unlock controller-1. Check if puppet mainfest is executed succesfully on controller-1 after reboot. Controller should come to unlocked/enabled/available state. PASS: Standard setup- lock/unlock controller-0. Check if puppet mainfest is executed succesfully on controller-0 after reboot. Controller should come to unlocked/enabled/available state. Depends-on: https://review.opendev.org/c/starlingx/ansible-playbooks/+/904342 Story: 2010873 Task: 49323 Change-Id: I8e064fc0e7a6fc8a0b571673fe8f6e66e4e43aee Signed-off-by: Jagatguru Prasad Mishra <jagatguruprasad.mishra@windriver.com> |
||
---|---|---|
api-ref/source | ||
config-gate | ||
controllerconfig | ||
devstack | ||
doc | ||
releasenotes | ||
storageconfig | ||
sysinv | ||
tmp/patch-scripts/EXAMPLE_SYSINV/scripts | ||
tools/docker/images | ||
tsconfig | ||
workerconfig | ||
.gitignore | ||
.gitreview | ||
.yamllint | ||
.zuul.yaml | ||
CONTRIBUTORS.wrs | ||
LICENSE | ||
README.rst | ||
bindep.txt | ||
centos_build_layer.cfg | ||
centos_dev_wheels.inc | ||
centos_iso_image.inc | ||
centos_pkg_dirs | ||
centos_pkg_dirs_containers | ||
centos_stable_wheels.inc | ||
debian_build_layer.cfg | ||
debian_iso_image.inc | ||
debian_pkg_dirs | ||
debian_stable_wheels.inc | ||
test-requirements.txt | ||
tox.ini |
README.rst
config
The starlingx/config repository handles the StarlingX configuration management services.
Its key component is the System Inventory Service (Sysinv), which provides the system command-line interface (CLI)1.
This repository is not intended to be developed standalone, but rather as part of the StarlingX Source System, which is defined by the StarlingX manifest2.