# # Copyright (c) 2022-2023 Wind River Systems, Inc. # SPDX-License-Identifier: Apache-2.0 # ############################################################################ # # StarlingX Debian Unified Miniboot/USB Install Kickstart # ############################################################################ # # This is the unified kickstart for Debian installation of subcloud nodes # from the USB or over Redfish. # # IMPORTANT: # This file is derived from kickstart.cfg. Since we must pull bug fixes # from kickstart.cfg, developers should be mindful to minimize the diff # between the two files. # # The Linux Assembly Tool (LAT) performs a unified install for all subcloud # nodes and exposes boot loader environment variables to this kickstart. # # This kickstart must be called with the 'traits=' boot parameter. # Valid traits are: # # controller ... the controller function # storage ... the storage function # worker ... the worker function # lowlatency ... the low latency function # # Valid node personality trait groupings ... set configuration function # # traits=controller ... Controller # traits=controller,worker ... All-in-one # traits=controller,worker,lowlatency ... All-in-one Low Latency # traits=storage ... Storage # traits=worker ... Worker # traits=worker,lowlatency ... Worker Low Latency # # Kickstart Stages # # Kickstart Early - Common Functions Script # Pre Partition - Pre Disk Setup Common Script # Partition - Partition Disks # Mkfs - Format Partitions & LVM Volumes # Post - Traits & Platform Config File update # Post - Persistent Interface Setup # Post - Set Kernel Args # Post - Interface Setup # Post Nochroot - Kickstart Finalize Install UUID # Post Nochroot - Restage OSTree repo # - Save Install Scripts and Logs # Post - Log Filesystem Setup # Post Nochroot - Workarounds for enabling integration # Post Nochroot - Set up filesystems access # Post Nochroot - Set up package links per node type # ########################################################################### # # The first kickstart script creates '/tmp/lat/functions' common functions # file that can be loaded from any of the other hook sections. # ########################################################################### # Kickstart Early - Common Functions Script %ks-early --interpreter=/bin/bash # Define a hook to report error log if install failed cat << EOF > /tmp/lat/report_error_log.sh #!/bin/bash _dev=\$(blkid --label fluxdata -o device) if [ "\$_dev" != "" ] ; then mkdir -p /t mount -o rw,noatime \$_dev /t echo "Save install-fail.log to partition fluxdata /var (\$_dev)" sleep 2 cp /install.log /t/install-fail.log umount /t fi EOF chmod 755 /tmp/lat/report_error_log.sh cat << EOF >> /tmp/lat/ks_functions.sh [ "\${HOOK_LABEL}" = "" ] && HOOK_LABEL="unknown" export LOG_DIR="var/log" export LAT_DIR="tmp/lat" export LOGFILE="/\${LAT_DIR}/miniboot.log" ############################################################################ # log utils ############################################################################ function log() { local dt="\$(date "+%Y-%m-%d %H:%M:%S.%3N")" echo "\$dt miniboot \${HOOK_LABEL} info: \${prefix} \$1" >>\${LOGFILE} } function ilog() { [ -z "\${stdout}" ] && stdout=1 local dt="\$(date "+%Y-%m-%d %H:%M:%S.%3N")" echo "\$dt miniboot \${HOOK_LABEL} info: \${prefix} \$1" >&\${stdout} echo "\$dt miniboot \${HOOK_LABEL} info: \${prefix} \$1" >>\${LOGFILE} } function dlog() { if [ \${debug} -ne 0 ] ; then [ -z "\$stdout" ] && stdout=1 local dt="\$(date "+%Y-%m-%d %H:%M:%S.%3N")" echo "\$dt miniboot \${HOOK_LABEL} debug: \${prefix} \$1" >&\${stdout} echo "\$dt miniboot \${HOOK_LABEL} debug: \${prefix} \$1" >>\${LOGFILE} fi } function wlog() { [ -z "\$stdout" ] && stdout=1 local dt="\$(date "+%Y-%m-%d %H:%M:%S.%3N")" echo "\$dt miniboot \${HOOK_LABEL} warn: \${prefix} \$1" >&\${stdout} echo "\$dt miniboot \${HOOK_LABEL} warn: \${prefix} \$1" >>\${LOGFILE} } function elog() { [ -z "\$stdout" ] && stdout=1 local dt="\$(date "+%Y-%m-%d %H:%M:%S.%3N")" echo "\$dt miniboot \${HOOK_LABEL} error: \${prefix} \$1" >&\${stdout} echo "\$dt miniboot \${HOOK_LABEL} error: \${prefix} \$1" >>\${LOGFILE} } ######################################################################## # Name : report_failure_with_msg # Purpose : Report installation error, offer a console and # reboot on exit. # Parameters: \$1 is the failure message string # Return : Does not return ######################################################################## function report_failure_with_msg() { local msg=\${1} echo -e '\n\nInstallation failed.\n' wlog "Installation Failed: ERROR: \${msg}" echo "... dropping to shell ; exit to reboot ..." sleep 1 bash reboot -f } ######################################################################## # Name : get_disk # Parameters: \$1 - any disk path # Returns : echo of the canonicalized version of the disk path # # Example : /dev/sda -> /dev/sda # : /dev/nvme1n1 -> /dev/nvme1n1 # : /dev/disk/by-path/pci-0000:02:00.0-scsi-0:1:0:0 -> /dev/sda # : /dev/disk/by-id/wwn-0x50014ee6ae58b07f -> /dev/sdc # : /dev/disk/by-id/wwn-0x600508b1001c2a30 -> /dev/dm-0 ######################################################################### function get_disk() { echo "\$(cd /dev ; readlink -f \$1)" } ######################################################################### # Name : get_persistent_disk # Parameters: \$1 - device name i.e. /dev/sda # Returns : echo of device name by-path or by-id # example: /dev/disk/by-path/pci-0000:03:00.0-scsi-0:2:0:0 or # /dev/disk/by-id/wwn-0x50014ee6ae58b07f # # Notes: During kickstarts there are 2 links to a generic /dev/sd. # Example: pci-0000:00:1f.2-ata-1 and pci-0000:00:1f.2-ata-1.0. # After reboot only the longer 'ata-1.0' exists. # Reverse the parsing so we return the longer path. ######################################################################### function get_persistent_disk() { local dev=\$(cd /dev ; readlink -f \$1) case \$dev in *"dm-"*) for p in /dev/disk/by-id/wwn-*; do if [ "\$(basename \$dev)" = "\$(basename \$(readlink -f \$p))" ]; then echo "\$p" return fi done ;; *) reverse_list="" for p in /dev/disk/by-path/*; do reverse_list="\${p} \${reverse_list}" done for p in \${reverse_list}; do if [ "\$(basename \$dev)" = "\$(basename \$(readlink -f \$p))" ]; then echo "\$p" return fi done ;; esac } ######################################################################### # Name : get_part_prefix # Parameters: \$1 - device name i.e. /dev/sda, /dev/nvme0n1, /dev/dm-0 # Returns : echo of acceptable partition prefix # example: /dev/sda # /dev/nvme0n1p # /dev/disk/by-id/wwn-0x50014ee6ae58b07f-part ######################################################################### function get_part_prefix() { # ensure that we have a canonicalized device local dev=\$(cd /dev ; readlink -f \$1) case \$dev in *"nvme"*) echo "\${dev}p" ;; *"dm-"*) for p in /dev/disk/by-id/wwn-*; do if [ "\$dev" = "\$(readlink -f \$p)" ]; then echo "\${p}-part" return fi done ;; *) echo "\${dev}" ;; esac } ######################################################################### # Name : exec_retry # Purpose : Retry operations up to a caller specified ... # Parameters: $1 - retries - up to number of retries before giving up # $2 - time in seconds between each retry # $3 - the command string to execute # Returns : exit code from last command operation ######################################################################### function exec_retry() { local retries=\${1} local interval=\${2} local command=\${3} # local variables retry_count=1 local ret_code=0 local ret_stdout="" command="\${command}" # 2>&\${stdout}" while [ \${retry_count} -le \${retries} ]; do # dlog "Running command: '\${command}'." ret_stdout=\$(eval \${command}) ret_code=\${?} [ \${ret_code} -eq 0 ] && break wlog "Error running command '\${command}'. Try \${retry_count} of \${retries} retry in \${interval}s." wlog "ret_code: \${ret_code}, stdout: '\${ret_stdout}'." sleep \${interval} retry_count=\$((retry_count+1)) done echo "\${ret_stdout}" return \${ret_code} } ######################################################################### # Name : exec_no_fds # Purpose : Execute command (with retries) after closing fds # Parameters: $1 - List of volume file descriptors # $2 - the command string to execute # $3 - up to number of retries before giving up # $4 - time in seconds between each retry # Returns : exit code from last command operation ######################################################################### function exec_no_fds() { # Close open FDs when executing commands that complain about leaked FDs. local fds=\${1} local cmd=\${2} local retries=\${3} local interval=\${4} local ret_code=0 local ret_stdout="" for fd in \${fds} do local cmd="\${cmd} \$fd>&-" done if [ -z "\${retries}" ]; then #wlog "Running command: '\${cmd}'." eval "\${cmd}" else ret_stdout=\$(exec_retry "\${retries}" "\${interval}" "\${cmd}") ret_code=\${?} echo "\${ret_stdout}" return \${ret_code} fi } ######################################################################### # Name : is_miniboot # Returns : true : 0 if this is remote subcloud install (redfish) # false: 1 ######################################################################### function is_miniboot() { if [ "\$(grep -c 'ip=' /proc/cmdline)" -ne 0 ]; then return 0 else return 1 fi } ######################################################################### # Name : is_system_node_install # Returns : true : 0 if 'pxecontroller' is in $insturl boot arg # false: 1 ######################################################################### function is_system_node_install() { # minboot: always false return 1 } ######################################################################### # Name : is_usb_install # Returns : true :0 # false:1 ######################################################################### function is_usb_install() { # minboot: always false return 1 } ######################################################################### # Name : check_prestage # Returns : true :0 # false:1 ######################################################################### function check_prestage() { # minboot: always false return 1 } ######################################################################### # Name : is_prestage # Returns : true :0 # false:1 ######################################################################### function is_prestage() { # minboot: always false return 1 } ######################################################################### # Name : update_platform_conf # Purpose : Update the platform.conf file with logging ######################################################################### PLATFORM_CONF="/etc/platform/platform.conf" function update_platform_conf() { ilog "update \${IMAGE_ROOTFS}\${PLATFORM_CONF} : \${1}" echo "\${1}" >> \${IMAGE_ROOTFS}\${PLATFORM_CONF} } ######################################################################### # Name : get_iface_from_ethname # Purpose : Translate eth# interface to the alternate predicitive # interface name'altname'. # Parameter: eth# name interface string to translate # Return : echo's of altname interface string ######################################################################### # TODO: Move to where its used if there is only one section caller function get_iface_from_ethname() { iface=\${1} # log the interface info for post issue debug udevadm info --export --query=property --path=/sys/class/net/\${iface} >> \${LOGFILE} # convert to predictive name: ONBOARD > SLOT > PATH # https://wiki.debian.org/NetworkInterfaceNames altname=\$(udevadm info --export --query=property --path=/sys/class/net/\${iface} | grep ID_NET_NAME_ONBOARD) altname=\${altname#ID_NET_NAME_ONBOARD=} if [ -z "\${altname}" ] ; then # try searching for ID_NET_NAME_SLOT log "... retrying to translate \${iface} to predictive name with ID_NET_NAME_SLOT filter label " altname=\$(udevadm info --export --query=property --path=/sys/class/net/\${iface} | grep ID_NET_NAME_SLOT) altname=\${altname#ID_NET_NAME_SLOT=} fi if [ -z "\${altname}" ] ; then # try searching for ID_NET_NAME_PATH log "... retrying to translate \${iface} to predictive name with ID_NET_NAME_PATH filter label " altname=\$(udevadm info --export --query=property --path=/sys/class/net/\${iface} | grep ID_NET_NAME_PATH) altname=\${altname#ID_NET_NAME_PATH=} fi # The altname is seen enveloped with tick's ; 'eno1' # Handle with and without tick's just in case if [ -z "\${altname}" ] ; then log "Failed to translate \${iface} to predictive name" elif [ "\${altname::1}" = "'" ] ; then echo "\${altname:1:-1}" else echo "\${altname}" fi } function display_volume_info () { if [ \${debug} -ne 0 ] ; then ilog "Volume Info:\${1}" pvscan 2>/dev/null pvscan 2>/dev/null >> \${LOGFILE} lvscan 2>/dev/null lvscan 2>/dev/null >> \${LOGFILE} pvdisplay 2>/dev/null pvdisplay 2>/dev/null >> \${LOGFILE} lvdisplay 2>/dev/null lvdisplay 2>/dev/null >> \${LOGFILE} fi } display_mount_info() { if [ \${debug} -ne 0 ] ; then echo "~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~" lsblk -o name,mountpoint,label,size,uuid echo "~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~" fi } function log_lvm_conf () { local msg=\${1} local conf=\${2} lvm_global_filter=\$(cat \${conf} | grep "global_filter =") lvm_preferred_names=\$(cat \${conf} | grep "preferred_names =") ilog "\${msg}: \${conf}: \${lvm_global_filter}" ilog "\${msg}: \${conf}: \${lvm_preferred_names}" } function breakpoint() { echo "*** BREAKPOINT ***: \${1} ; type exit to continue" bash echo "continuing from breakpoint: \${1}" } function set_variable() { touch "/\${LAT_DIR}/\${1}" } function get_variable() { [ -e "/\${LAT_DIR}/\${1}" ] && return 1 return 0 } function clr_variable() { rm -f "/\${LAT_DIR}/\${1}" } ######################################################################### # Name : get_aio_controller_provisioning_sizes # Purpose : Provide partition, physical volume, and logical volume sizes # Parameter: None # Return : Nothing, but exports key values ######################################################################### function get_aio_controller_provisioning_sizes() { gib=\$((1024*1024*1024)) # Partitions export PART_SZ_EFI=300 export PART_SZ_BOOT=2048 export PART_SZ_ROOT=0 # Logical volumes export LV_SZ_LOG=8000 export LV_SZ_ROOT=20480 export LV_SZ_SCRATCH=16000 export LV_SZ_VAR=20480 ## ## NOTE: updates to partition sizes need to be also reflected in ## - config/.../sysinv/conductor/manager.py:create_controller_filesystems() ## - config/.../sysinv/common/constants.py ## ## NOTE: When adding partitions, we currently have a max of 4 primary partitions. ## If more than 4 partitions are required, we can use a max of 3 --asprimary, ## to allow 1 primary logical partition with extended partitions ## ## NOTE: Max default PV size must align with the default controllerfs sizes ## ## ## NOTE TO REVIEWERS: ## This section was talen from CentOS and needs to be updated for Debian. ## ##*********************************************************************** ## Large disk install (for disks over 240GB) ## - DB size is doubled to allow for upgrades ## ## BACKUP_OVERHEAD = 5GiB ## DEFAULT_PLATFORM_STOR_SIZE = 10GiB ## DEFAULT_DATABASE_STOR_SIZE = 10GiB ## BACKUP = DEFAULT_DATABASE_STOR_SIZE + ## DEFAULT_PLATFORM_STOR_SIZE + ## BACKUP_OVERHEAD = 25GiB ## LV_SZ_LOG = 8GiB ## LV_SZ_ROOT = 20 GiB ## LV_SZ_SCRATCH = 16GiB ## LV_SZ_VAR = 20 GiB ## RABBIT_LV = 2GiB ## DEFAULT_EXTENSION_STOR_SIZE = 1GiB ## KUBERNETES_DOCKER_STOR_SIZE = 30GiB ## DOCKER_DISTRIBUTION_STOR_SIZE = 16GiB ## ETCD_STOR_SIZE = 5GiB ## CEPH_MON_SIZE = 20GiB ## KUBELET_STOR_SIZE = 10GiB ## DC_VAULT_SIZE = 15GiB ## RESERVED_PE = 16MiB (based on pesize=32768) ## ## MINIMUM_PLATFORM_PV_SIZE = (10 + 2*10 + 25 + 8 + 20 + 16 + 20 + 2 + 1 + 30 + 16 + 5 + 20 + 10 + 15)GiB + 16MiB/1024 = 218.02GiB ## ##*********************************************************************** ## Small disk install - (for disks below 240GB) ## - DB size is doubled to allow for upgrades ## ## DEFAULT_PLATFORM_STOR_SIZE = 10GiB ## DEFAULT_SMALL_DATABASE_STOR_SIZE = 5GiB ## DEFAULT_SMALL_BACKUP_STOR_SIZE = 20GiB ## ## LV_SZ_LOG = 8GiB ## LV_SZ_SCRATCH = 16GiB ## RABBIT_LV = 2GiB ## DEFAULT_EXTENSION_STOR_SIZE = 1GiB ## KUBERNETES_DOCKER_STOR_SIZE = 30GiB ## DOCKER_DISTRIBUTION_STOR_SIZE = 16GiB ## ETCD_STOR_SIZE = 5GiB ## CEPH_MON_SIZE = 20GiB ## KUBELET_STOR_SIZE = 10GiB ## DC_VAULT_SIZE = 15GiB ## RESERVED_PE = 16MiB (based on pesize=32768) ## ## MINIMUM_PLATFORM_PV_SIZE = (10 + 2*5 + 20 + 8 + 16 + 2 + 1 + 30 + 16 + 5 + 20 + 10 + 15)GiB + 16MiB/1024 = 163.02GiB ## ##*********************************************************************** ## Tiny disk install - (for disks below 154GB) ## ## NOTE: Tiny disk setup is mainly for StarlingX running in QEMU/KVM VM. ## ## DEFAULT_TINY_PLATFORM_STOR_SIZE = 1GiB ## DEFAULT_TINY_DATABASE_STOR_SIZE = 1GiB ## DEFAULT_TINY_BACKUP_STOR_SIZE = 1GiB ## ## LV_SZ_LOG = 3GiB ## LV_SZ_SCRATCH = 2GiB ## RABBIT_LV = 2GiB ## DEFAULT_EXTENSION_STOR_SIZE = 1GiB ## TINY_KUBERNETES_DOCKER_STOR_SIZE = 20GiB ## TINY_DOCKER_DISTRIBUTION_STOR_SIZE = 8GiB ## TINY_ETCD_STOR_SIZE = 1GiB ## TINY_KUBELET_STOR_SIZE = 2GiB ## ## MINIMUM_PLATFORM_PV_SIZE = (1 + 2*1 + 1 + 3 + 2 + 2 + 1 + 20 + 8 + 1 + 2)GiB = 43GiB ## ## MINIMUM_TINY_DISK_SIZE = MINIMUM_PLATFORM_PV_SIZE + PART_SZ_ROOT + PART_SZ_EFI + PART_SZ_BOOT + FLUXDATA + BACKUP_SIZE ## = 43 + 20 + 0.03 + 0.5 + 20 + 1 = 85GiB # TODO: create a log representing 'free space" on self expand partition. # TODO: Do the math for this new environment # The default disk size thresholds must align with the ones in # config/.../sysinv/common/constants.py # which are DEFAULT_SMALL_DISK_SIZE # MINIMUM_SMALL_DISK_SIZE default_small_disk_size=240 minimum_small_disk_size=196 sz=\$(blockdev --getsize64 \${INSTDEV}) ilog "Install disk \${INSTDEV} has size:\${sz}B, \$((\${sz}/\$gib))GiB" # Round MINIMUM_PLATFORM_PV_SIZE to the closest upper value that can be divided by 1024. if [ \${sz} -gt \$((\${default_small_disk_size}*\${gib})) ] ; then ilog "Large disk: MINIMUM_PLATFORM_PV_SIZE=219GiB*1024=224256 MiB" export BACKUP_DEFAULT_PERSISTENT_SIZE=30000 elif [ \${sz} -ge \$((\${minimum_small_disk_size}*\${gib})) ] ; then ilog "Small disk: MINIMUM_PLATFORM_PV_SIZE=164GiB*1024=167936 MiB" export BACKUP_DEFAULT_PERSISTENT_SIZE=30000 else ilog "Tiny disk: MINIMUM_PLATFORM_PV_SIZE=43GiB*1024=44032 MiB" # Using a disk with a size under 85GiB will fail. export LV_SZ_LOG=3000 export LV_SZ_SCRATCH=2000 export BACKUP_DEFAULT_PERSISTENT_SIZE=1000 fi } ######################################################################### # Name : get_std_controller_provisioning_sizes # Purpose : Provide partition, physical volume, and logical volume sizes # Parameter: None # Return : Nothing, but exports key values ######################################################################### function get_std_controller_provisioning_sizes() { ## NOTE: updates to partition sizes need to be also reflected in ## _controller_filesystem_limits() in sysinv/api/controllers/v1/istorconfig.py # Partitions export PART_SZ_EFI=300 export PART_SZ_BOOT=2048 export PART_SZ_ROOT=0 export BACKUP_DEFAULT_PERSISTENT_SIZE=30000 # Logical volumes export LV_SZ_LOG=8000 export LV_SZ_ROOT=20480 export LV_SZ_SCRATCH=16000 export LV_SZ_VAR=20480 } ######################################################################### # Name : get_worker_provisioning_sizes # Purpose : Provide partition, physical volume, and logical volume sizes # Parameter: None # Return : Nothing, but exports key values ######################################################################### function get_worker_provisioning_sizes() { # miniboot: unused ilog get_worker_provisioning_sizes } ######################################################################### # Name : get_storage_provisioning_sizes # Purpose : Provide partition, physical volume, and logical volume sizes # Parameter: None # Return : Nothing, but exports key values ######################################################################### function get_storage_provisioning_sizes() { # miniboot: unused ilog get_storage_provisioning_sizes } ######################################################################### # Name : parse_miniboot_network_params # Purpose : Setup IP addressing for two cases: # 1) initial boot and 2) persistent across reboot # Parameter: operation: one of 'initial' or 'persistent' # Return : Nothing ######################################################################### function parse_miniboot_network_params() { BOOTPARAM_MGMT_ADDRESS_FAMILY= BOOTPARAM_IP_ADDR= BOOTPARAM_VLAN= BOOTPARAM_GW= BOOTPARAM_PREFIX_LEN= BOOTPARAM_IFNAME= BOOTPARAM_IP_VER= BOOTPARAM_METRIC= BOOTPARAM_DNS= # Parse values from /proc/cmdline local ipstring= local vlan= for arg in \$(cat /proc/cmdline); do case "\${arg}" in ip=*) ipstring=\${arg:3} ilog "Using ip=\$ipstring" ;; vlan=*) vlan=\${arg:5} ilog "Using vlan=\${vlan}" ;; esac done ilog "Parsing boot ipstring=\$ipstring" # Now we have a string like: # ,,,,,,off,, # 1 2 3 4 5 6 7 8 9 # identify if ipv4 or ipv6, and get the ip address # # 10.10.10.22,,10.10.10.1,23,subcloud2,enp2s1,none (for ipv4) # [2620:10a:a001:d41::212],,,64,subcloud3,ens1f0.401,none (for ipv6) BOOTPARAM_IP_ADDR=\$(echo \$ipstring | awk -F',' '{print \$1}' | tr -d '\[\]') BOOTPARAM_GW=\$(echo \$ipstring | awk -F',' '{print \$3}' | tr -d '\[\]') BOOTPARAM_PREFIX_LEN=\$(echo \$ipstring | awk -F',' '{print \$4}') hostname=\$(echo \$ipstring | awk -F',' '{print \$5}') BOOTPARAM_IFNAME=\$(echo \$ipstring | awk -F',' '{print \$6}') # Do not setup DNS for now - we use IP addresses during boot: # BOOTPARAM_DNS=\$(echo \$ipstring | awk -F',' '{print \$8}') case "\$ipstring" in *'['*) # if has [ ] then it is ipv6: BOOTPARAM_MGMT_ADDRESS_FAMILY="inet6" BOOTPARAM_IP_VER="-6" BOOTPARAM_METRIC="metric 1" ;; *) BOOTPARAM_MGMT_ADDRESS_FAMILY="inet" ;; esac if [ -n "\${vlan}" ]; then # Parameter format: "bootstrap_interface.bootstrap_vlan:bootstrap_interface" dlog "Parsing vlan from \${vlan}" vlan=\${vlan#*.} # remove prefix 'bootstrap_interface.' vlan=\${vlan%:*} # remove suffix ':bootstrap_interface' BOOTPARAM_VLAN=\${vlan} BOOTPARAM_IFNAME=\${BOOTPARAM_IFNAME%.*} # remove suffix '.bootstrap_vlan' fi logmsg="Using IP values: ip:\$BOOTPARAM_IP_ADDR, family: \$BOOTPARAM_MGMT_ADDRESS_FAMILY" if [ -n "\$BOOTPARAM_VLAN" ]; then logmsg="\$logmsg vlan: \$BOOTPARAM_VLAN, " fi logmsg="\$logmsg prefix:\$BOOTPARAM_PREFIX_LEN, ifname: \$BOOTPARAM_IFNAME, " if [ -n "\${BOOTPARAM_GW}" ]; then logmsg="\$logmsg gw:\$BOOTPARAM_GW, " fi logmsg="\$logmsg metric: \$BOOTPARAM_METRIC, dns: \$BOOTPARAM_DNS" ilog "\$logmsg" export BOOTPARAM_MGMT_ADDRESS_FAMILY export BOOTPARAM_IP_ADDR export BOOTPARAM_VLAN export BOOTPARAM_GW export BOOTPARAM_PREFIX_LEN export BOOTPARAM_IFNAME export BOOTPARAM_IP_VER export BOOTPARAM_METRIC export BOOTPARAM_DNS } ######################################################################### # Name : wait_for_interface # Purpose : Wait for interface to settle # Parameter: interface name # Return : Nothing ######################################################################### function wait_for_interface() { local ifname=\$1 local timeout=\${2:-60} local operstate= local count_sec=0 ilog "Waiting for interface \${ifname} to settle... [timeout: \${timeout}s]" while [ \${count_sec} -lt \${timeout} ]; do sleep 1 if [ -e /sys/class/net/\${mgmt_dev}/operstate ]; then operstate=\$(cat /sys/class/net/\${mgmt_dev}/operstate) if [ "\$operstate" = up ]; then ilog "\${mgmt_dev} operstate: up" return fi dlog "\${mgmt_dev} operstate: \$operstate" fi count_sec=\$(( count_sec + 1 )) done case "\$operstate" in unknown) # see: https://www.kernel.org/doc/Documentation/networking/operstates.txt wlog "Timeout: \${mgmt_dev} operstate: unknown. Allowing boot to continue." return ;; *) report_failure_with_msg "Timeout waiting for interface \${ifname} to settle; operstate: \$operstate" ;; esac } ########################################################################## # Global Kickstart Constants # ########################################################################## # # NOTE: exported Variables from other segments are NOT visible from functions # # Log the server firmware type if [ -d /sys/firmware/efi ] ; then ilog "UEFI Firmware execution" USE_UEFI_PARTITIONS=1 else ilog "BIOS Firmware execution" USE_UEFI_PARTITIONS=0 fi if [ "\${controller}" = true ] ; then # Legacy locations of the backup partition BACKUP_PART_UEFI=1 BACKUP_PART_BIOS=2 # Set the expected locations of the backup partition if [ "\$USE_UEFI_PARTITIONS" = 0 ] ; then BACKUP_PART_NO=\${BACKUP_PART_BIOS} else BACKUP_PART_NO=\${BACKUP_PART_UEFI} fi BACKUP_PART_LABEL="platform_backup" # Note that the BA5EBA11-0000-1111-2222- is the prefix used by STX and it's # defined in sysinv constants.py. Since the 000000000001 suffix is used by # custom stx LVM partitions, the next suffix is used for the persistent backup # partition (000000000002) BACKUP_PART_GUID="BA5EBA11-0000-1111-2222-000000000002" fi # Node Personality Trait TRAIT__CONTROLLER="controller" TRAIT__STORAGE="storage" TRAIT__WORKER="worker" TRAIT__LOWLATENCY="lowlatency" # System Types SYSTEM_TYPE__AIO="All-in-one" SYSTEM_TYPE__STANDARD="Standard" # Node Subfunctions SUBFUNCTION__CONTROLLER="\${TRAIT__CONTROLLER}" SUBFUNCTION__STORAGE="\${TRAIT__STORAGE}" SUBFUNCTION__WORKER="\${TRAIT__WORKER}" SUBFUNCTION__AIO="\${TRAIT__CONTROLLER},\${TRAIT__WORKER}" VOLUME_GROUPS="cgts-vg" EOF ############################### # END of Common Functions Block ############################### chmod 755 /tmp/lat/ks_functions.sh HOOK_LABEL="ks-early" . /tmp/lat/ks_functions.sh ########################################################################## # Global Kickstart variables # ########################################################################## export debug=0 export prefix="" # Assume there is no Platform Backup (persistent) Partition export BACKUP_PART_FOUND=0 export BACKUP_PART_CURRENT_SIZE=0 export STOR_DEV_FDS="" export PROC_SELF_FDS="$(ls -1 /proc/$$/fd | egrep -v "^(0|1|2|255)$" | xargs)" for fd in ${PROC_SELF_FDS}; do export realpath=$(readlink -f /proc/$$/fd/"${fd}") if [ -e "${realpath}" ]; then STOR_DEV_FDS="${STOR_DEV_FDS} ${fd}" fi done ########################################################################## # Local Kickstart variables # ########################################################################## BACKUP_PART_FIRST=0 BACKUP_PART_END=0 BACKUP_PART_SIZE=0 BACKUP_PART_FLAGS=0 BACKUP_PART_NAME="" ########################################################################## ilog "*****************************************************" ilog "*** Pre Partition - Volume Remove & Wipe Disk ***" ilog "*****************************************************" if [ -z "${traits}" ] ; then report_failure_with_msg "No install traits specified ; need boot arg traits=" fi ilog "Waiting for disks to be available" udevadm settle --timeout=300 || report_failure_with_msg "udevadm settle failed" ilog "Disks became available" export controller=false export storage=false export worker=false export lowlatency=false export aio=false for trait in ${traits//,/ }; do # dlog "trait:${trait}" case ${trait} in "controller") controller=true ;; "storage") storage=true ;; "worker") worker=true ;; "lowlatency") lowlatency=true ;; *) wlog "unknown trait '${trait}'" ;; esac done # Force enable 'lowlatency' trait if the realtime kernel is detected ; PREEMPT_RT uname=$(uname -a) if [[ "${uname}" == *"PREEMPT_RT"* ]] ; then if [ "${lowlatency}" = false ] ; then wlog "forcing lowlatency trait after discovering the RT kernel" lowlatency=true fi fi # Handle trait conbination errors # # Handle no valid nodetypes specified if [ "${controller}" = false -a "${storage}" = false -a "${worker}" = false ] ; then report_failure_with_msg "No valid install traits specified ; ${traits} ; need boot arg traits=" # Storage and controller don't go together elif [ "${storage}" = true -a "${controller}" = true ] ; then report_failure_with_msg "Cannot combine storage and controller traits" # Storage and lowlatency don't go together elif [ "${storage}" = true -a "${lowlatency}" = true ] ; then report_failure_with_msg "Cannot combine storage and lowlatency traits" # Storage and worker don't go together elif [ "${storage}" = true -a "${worker}" = true ] ; then report_failure_with_msg "Cannot combine storage and worker traits" else ilog "Install traits: $traits" fi # setup the install type for the log prefix if [ "${controller}" = true -a "${worker}" = true ] ; then aio=true prefix="${SYSTEM_TYPE__AIO}" elif [ "${controller}" = true ] ; then prefix="${TRAIT__CONTROLLER}" elif [ "${worker}" = true ] ; then report_failure_with_msg "Invalid miniboot subcloud traits: $traits" elif [ "${storage}" = true ] ; then report_failure_with_msg "Invalid miniboot subcloud traits: $traits" fi if [ "${lowlatency}" = true ] ; then prefix="${prefix}-${TRAIT__LOWLATENCY}" fi grep -q 'debug_kickstart' /proc/cmdline if [ $? -eq 0 ]; then debug=1 fi # First, parse /proc/cmdline to find the boot args set -- `cat /proc/cmdline` ilog "/proc/cmdline:$*" # for I in $*; do case "$I" in *=*) eval $I 2>/dev/null;; esac; done for arg in $*; do case "$arg" in *=*) eval $arg 2>/dev/null log "arg : $arg" ;; esac done # Handle persistent_size setting. # If the persistent_size is less than the size of the existing persistent backup, # then the installation process must terminate and exit. if [ -n "${persistent_size}" ]; then part=$(readlink -f "/dev/disk/by-partlabel/platform_backup") device=$(readlink -f "${rootfs_device}") ilog "Persistent backup is in ${part}" MAX_SIZE=$(parted -s ${device} unit MiB print | grep "Disk ${device}:" | awk '{print $3}' | sed 's/[^C0-9]*//g') CURRENT_PERSISTENT_SIZE=$(parted -s ${part} unit MiB print | grep ${part} | awk '{print $3}' | sed 's/[^C0-9]*//g') ilog "Current size of persistent backup is ${CURRENT_PERSISTENT_SIZE}" ilog "Max size of ${device} is ${MAX_SIZE}" if [ ${persistent_size} -lt ${CURRENT_PERSISTENT_SIZE} ]; then ilog "Provided persistent_size (${persistent_size}) is less than ${CURRENT_PERSISTENT_SIZE}" report_failure_with_msg "Persistent size setting is less than current backup size (${CURRENT_PERSISTENT_SIZE})" fi if [ ${persistent_size} -gt ${MAX_SIZE} ]; then ilog "Provided persistent_size (${persistent_size}) is greater than ${MAX_SIZE}" report_failure_with_msg "Persistent size setting is greater than maximum allowable size (${MAX_SIZE})" fi fi # Note: This is equivalent to pre_disk_setup_common.cfg # Name : check_execs # Purpose: Confirm all the executables required by the kickstart are present # Returns: 1 of one or more executable are missing REQUIRED_EXECS="bc blkid dd lvcreate mkfs.ext4 partprobe pvremove pvs sgdisk vgcreate wipefs" function check_execs() { missing_exec=0 for x in ${REQUIRED_EXECS} ; do which ${x} > /dev/null 2>&1 if [ ${?} -ne 0 ] ; then elog "dependency check failed ; required '${x}' exec is missing" missing_exec=1 fi done return ${missing_exec} } # Log Traits [ "${controller}" = true ] && ilog "Controller Function" [ "${storage}" = true ] && ilog "Storage Function" [ "${worker}" = true ] && ilog "Worker Function" [ "${lowlatency}" = true ] && ilog "Low Latency Function" # Log System Type if [ ${aio} = true ] ; then ilog "system" else ilog "${SYSTEM_TYPE__STANDARD} system" fi # Verify that all the required executables are presenty check_execs [ $? -ne 0 ] && report_failure_with_msg "Required executables are missing" #################################################### # pre_common_head (obsolete with lat) #################################################### # TODO: The installer does not have 'timezone' # Does LAT handle this ? wlog "timezone not set ; 'timezone --nontp --utc UTC'" # We need both the system date and hwclock to be "close" to the current # date/time, in order to avoid cases of invalid SSL certificates during # interaction with the system controller. With the 'instdate' # boot paramter, the system clock will already be initialized by LAT. # If the hwclock differs from system date by a significant amount then # we update it here based on the current system date. # # System date initialization summary: # Note: NTP is not running at these early stages of install # # miniboot: # - The system date is initialized to 'instdate' via LAT. # Note that this may be several minutes out of sync with reality # since instdate is a snapshot at time of bootimage.iso creation. # # ostree boot (after miniboot, prior to subcloud bootstrap): # - The system date is initialized via hwclock. # # During miniboot we may have the case where the hwclock is more accurate # than the system date. We therefore only want to adjust the hwclock if # it is significantly different. if [ -n "${instdate}" ]; then ilog "Checking hwclock: $(hwclock), current date: $(date), instdate: $(date --date=${instdate})" # Only adjust if date mismatch is > 20m date_mismatch_threshold_secs=1200 current_date_epoch=$(date "+%s") hwclock_date_epoch=$(date --date="$(hwclock --get --utc)" "+%s") diff_epoch=$(( current_date_epoch - hwclock_date_epoch )) # absolute value: strip off any '-' from front of string: abs_diff_epoch=${diff_epoch#-} if [ ${abs_diff_epoch} -gt ${date_mismatch_threshold_secs} ]; then if [ -e /sbin/hwclock ] ; then ilog "Aligning hwclock to system date" /sbin/hwclock --systohc --utc if [ $? -ne 0 ]; then wlog "failed hwclock command ; /sbin/hwclock --systohc --utc [rc=${rc}]" fi else wlog "lat initrd is missing /sbin/hwclock" fi ilog "System date is now: $(date), hwclock: $(hwclock)" fi else elog "bootimage.iso was constructed without instdate: subcloud date may be out of sync" fi true %end # Pre Partition - Pre Disk Setup Common Script %pre-part --interpreter=/bin/bash HOOK_LABEL="pre-part" . /tmp/lat/ks_functions.sh ##################################################### # From pre_net_common.cfg for system node installs ##################################################### if is_system_node_install -eq 0 ; then # Setup ntp.conf and sync time cat </etc/ntp_kickstart.conf server pxecontroller EOF if [ -e /usr/sbin/ntpd ] ; then /usr/sbin/ntpd -g -q -n -c /etc/ntp_kickstart.conf rc=$? if [ ${rc} -eq 0 ]; then if [ -e /sbin/hwclock ] ; then /sbin/hwclock --systohc --utc if [ $? -ne 0 ]; then wlog "failed hwclock command ; /sbin/hwclock --systohc --utc" else ilog "ntpd and hwclock set ok" fi else wlog "lat initrd is missing /sbin/hwclock" fi else wlog "ntpd setup failed rc:$rc ; /usr/sbin/ntpd -g -q -n -c /etc/ntp_kickstart.conf" fi else wlog "lat initrd is missing /usr/sbin/ntpd" fi fi ##################################################### # From pre_disk_setup_common.cfg ##################################################### if [ -n "${INSTDEV}" ] ; then persistent_instdev=$(get_persistent_disk "${INSTDEV}") if [ -z ${persistent_instdev} ] ; then report_failure_with_msg "invalid install device ${INSTDEV}" else ilog "Install device: ${INSTDEV} : ${persistent_instdev}" fi fi # Get all block devices of type disk in the system. # This includes solid state devices. # Note: /dev/* are managed by kernel tmpdevfs while links in # /dev/disk/by-path/ are managed by udev which updates them # asynchronously so avoid using them while performing partition # operations. ilog "Detected storage devices:" case ${persistent_instdev} in *"by-id"*) disk_regex='/dev/disk/by-id/wwn-*' ;; *) disk_regex='/dev/disk/by-path/*' ;; esac STOR_DEVS="" for f in ${disk_regex} ; do dev=$(readlink -f $f) # dlog "found device ${f}" exec_retry 2 0.5 "lsblk --nodeps --pairs $dev" | grep -q -e 'TYPE="disk"' -e 'TYPE="mpath"' if [ $? -eq 0 ]; then # Filter out ISO disk from storage devices check_valid_dev $dev || continue STOR_DEVS="$STOR_DEVS $dev" ilog "Adding ${f} -> ${dev} to managed device list" fi done # Filter STOR_DEVS variable for any duplicates as on some systems udev # creates multiple links to the same device. This causes issues due to # attempting to acquire a flock on the same device multiple times. STOR_DEVS=$(echo "$STOR_DEVS" | xargs -n 1 | sort -u | xargs) ilog "Unique storage devices: $STOR_DEVS" if [ -z "$STOR_DEVS" ] ; then report_failure_with_msg "No storage devices available." fi # Lock all devices so that udev doesn't trigger a kernel partition table # rescan that removes and recreates all /dev nodes for partitions on those # devices. Since udev events are asynchronous this could lead to a case # where /dev/ links for existing partitions are briefly missing. # Missing /dev links leads to command execution failures. for dev in $STOR_DEVS; do exec {fd}>$dev || report_failure_with_msg "Error creating file descriptor for $dev." flock -n "$fd" || report_failure_with_msg "Can't get a lock on fd $fd of device $dev." STOR_DEV_FDS="$STOR_DEV_FDS $fd" ilog "Locked ${dev} fd:${fd}" done # Log info about system state at beginning of partitioning operation for dev in $STOR_DEVS; do ilog "Initial partition table for $dev is:" # log "Initial partition table for $dev is:" parted -s $dev unit mib print # parted -s $dev unit mib print >> ${LOGFILE} done display_volume_info "before" display_mount_info # Consider removing since LAT already handles this failure mode # Ensure specified device is not a USB drive udevadm info --query=property --name="${INSTDEV}" | grep -q '^ID_BUS=usb' if [ $? -eq 0 ]; then report_failure_with_msg "Specified installation (${INSTDEV}) device is a USB drive." fi # Log the disk setup ilog "Volume Groups : ${VOLUME_GROUPS} ; $STOR_DEV_FDS" # update lvm.conf to prevent udev delays for locked devices sed -i "s#obtain_device_list_from_udev = 1#obtain_device_list_from_udev = 0#" /etc/lvm/lvm.conf # Deactivate existing volume groups to avoid Anaconda issues with pre-existing groups vgs=( $(exec_no_fds "$STOR_DEV_FDS" "vgdisplay -C --noheadings -o vg_uuid 2>/dev/null") ) if [ ${#vgs[@]} -eq 0 ] ; then ilog "No volume groups found" else for vg in ${vgs[@]}; do lvs=( $(exec_no_fds "$STOR_DEV_FDS" "lvs --select vg_uuid=${vg} --noheadings -o lv_name 2>/dev/null") ) vg_name=$(exec_no_fds "$STOR_DEV_FDS" "vgdisplay -C --noheadings --select vg_uuid=${vg} -o vg_name 2>/dev/null" | xargs) ilog "Wipe any previous signatures from ${vg_name} volume group" for lv in ${lvs[@]} ; do ilog "Wipe any previous signatures from ${lv} logical volume" exec_no_fds "$STOR_DEV_FDS" "wipefs -a /dev/${vg_name}/${lv} 2>/dev/null" 5 0.5 || wlog "Failed to wipe signatures from ${lv}" done ilog "Disable volume group ${vg}" exec_no_fds "$STOR_DEV_FDS" "vgchange -an --select vg_uuid=${vg} 2>/dev/null" 5 0.5 [ $? -ne 0 ] && report_failure_with_msg "Failed to disable ${vg}." done for vg in ${vgs[@]}; do vg_name=$(exec_no_fds "$STOR_DEV_FDS" "vgdisplay -C --noheadings --select vg_uuid=${vg} -o vg_name 2>/dev/null" | xargs) pvs=( $(exec_no_fds "$STOR_DEV_FDS" "pvs --select vg_uuid=${vg} --noheadings -o pv_name 2>/dev/null" | grep -v unknown) ) if [ ${#pvs[@]} -ne 0 ] ; then ilog "Remove logical volumes from ${vg_name} (${vg})" exec_no_fds "$STOR_DEV_FDS" "lvremove --force --select vg_uuid=${vg} 2>/dev/null" 5 0.5 || wlog "WARNING: Failed to remove lvs on ${vg_name} (${vg})." for pv in ${pvs[@]}; do ilog "Remove physical volume ${pv} from ${vg_name} (${vg})" exec_no_fds "$STOR_DEV_FDS" "pvremove --force --force --yes ${pv} 2>/dev/null" 5 0.5 [ $? -ne 0 ] && report_failure_with_msg "Failed to remove ${pv}." done fi ilog "Force remove volume group ${vg_name} (${vg})" exec_no_fds "$STOR_DEV_FDS" "vgremove --force --select vg_uuid=${vg} 2>/dev/null" 5 0.5 [ $? -ne 0 ] && report_failure_with_msg "Failed to remove ${vg_name} (${vg})." done fi display_volume_info "after" display_mount_info ONLYUSE_HDD="" part_type_guid_str="Partition GUID code" part_type_name_str="Partition name" part_type_size_str="Partition size" part_type_first_str="First sector" part_type_end_str="Last sector" part_type_flags_str="Attribute flags" # The /v1/upgrade/${hostname}/in_upgrade endpoint accepts any textual data # as hostname and returns system-wide upgrade state hostname="hostname" if [ "$(curl -sf http://pxecontroller:6385/v1/upgrade/${hostname}/in_upgrade 2>/dev/null)" = "true" ]; then # In an upgrade, only wipe the disk with the rootfs and boot partition wlog "In upgrade, wiping only ${INSTDEV}" WIPE_HDD=${INSTDEV} ONLYUSE_HDD="$(basename ${INSTDEV})" else # Make a list of all the hard drives that are to be wiped. # Never put the LAT install disk '${INSTDEV}' in that list. WIPE_HDD="" # Partition type OSD has a unique globally identifier CEPH_OSD_GUID="4FBD7E29-9D25-41B8-AFD0-062C0CEFF05D" CEPH_OSD_MPATH_GUID="4FBD7E29-8AE0-4982-BF9D-5A8D867AF560" CEPH_JOURNAL_GUID="45B0969E-9B03-4F30-B4C6-B4B80CEFF106" CEPH_JOURNAL_MPATH_GUID="45B0969E-8AE0-4982-BF9D-5A8D867AF560" # Check if we wipe OSDs if [ "$(curl -sf http://pxecontroller:6385/v1/ihosts/wipe_osds 2>/dev/null)" = "true" ]; then ilog "Wipe OSD data" WIPE_CEPH_OSDS="true" else ilog "Skip Ceph OSD data wipe." WIPE_CEPH_OSDS="false" fi for dev in $STOR_DEVS ; do # TODO: Allowing the install dev 'in' results in a failure mode where # every second install fails with the following error string # and unrecoverable mount failure. # # Logs: # # Warning: The kernel is still using the old partition table. # The new table will be used at the next reboot or after you # run partprobe(8) or kpartx(8) # and then # # Failure: # # mount: /sysroot: can't find LABEL=otaroot. # # Action: Find correct place to put partprobe # # Avoid wiping the install root disk # [ ${dev} == ${INSTDEV} ] && continue # Avoid wiping USB drives udevadm info --query=property --name=$dev |grep -q '^ID_BUS=usb' && continue # Avoid wiping ceph osds if sysinv tells us so if [ ${WIPE_CEPH_OSDS} == "false" ]; then wipe_dev="true" exec_no_fds "$STOR_DEV_FDS" "pvs" | grep -q "$dev *ceph" if [ $? -eq 0 ]; then wlog "skip rook provisoned disk $dev" continue fi part_numbers=( `parted -s $dev print | awk '$1 == "Number" {i=1; next}; i {print $1}'` ) # Scanning the partitions looking for CEPH OSDs and # skipping any disk found with such partitions for part_number in "${part_numbers[@]}"; do sgdisk_part_info=$(sgdisk -i $part_number $dev) part_type_guid=$(echo "$sgdisk_part_info" | grep "$part_type_guid_str" | awk '{print $4;}') if [ "$part_type_guid" == $CEPH_OSD_GUID -o "$part_type_guid" == $CEPH_OSD_MPATH_GUID ]; then wlog "OSD found on $dev, skipping wipe" wipe_dev="false" break fi dev_part_prefix=$(get_part_prefix "${dev}") exec_no_fds "$STOR_DEV_FDS" "pvs" | grep -q -e "${dev_part_prefix}${part_number} *ceph" -e "${dev_part_prefix}p${part_number} *ceph" if [ $? -eq 0 ]; then wlog "Rook OSD found on $dev_part_prefix$part_number, skip wipe" wipe_dev="false" break fi done if [ "$wipe_dev" == "false" ]; then continue fi fi # Add device to the wipe list devname=$(basename $dev) if [ -e $dev -a "$ISO_DEV" != "../../$devname" -a "$USB_DEV" != "../../$devname" ]; then ilog "Adding ${dev} to list of disks to be wiped" if [ -n "$WIPE_HDD" ]; then ilog "WIPE_HDD=$WIPE_HDD,$dev" WIPE_HDD=$WIPE_HDD,$dev else ilog "WIPE_HDD=$dev" WIPE_HDD=$dev fi fi done ilog "Not in upgrade" fi ilog "===========" ilog "WIPE DISKs: ${WIPE_HDD}" ilog "===========" inst_dev=$(get_disk "${INSTDEV}") for dev in ${WIPE_HDD//,/ } ; do ilog "Wiping $dev" # Clear previous GPT tables or LVM data on each disk. # # Rule: Exclude the persistent 'Platform backup' partition. # Note: Delete the first few bytes at the start and end of the partition. # This is required with GPT partitions because they save partition # info at both the start and the end of the block. # Get a list of partitions for this disk part_numbers=( $(parted -s $dev print | awk '$1 == "Number" {i=1; next}; i {print $1}') ) # For each device partition apply wipe rules for part_number in "${part_numbers[@]}"; do sgdisk_part_info=$(sgdisk -i $part_number $dev) part_name=$(echo "$sgdisk_part_info" | grep "$part_type_name_str" | awk '{print $3;}') # special handling for the install device if [ "${dev}" == "${inst_dev}" ] ; then # Skip over the bios, efi and boot partitions that got us here. # LAT handles these partitions case ${part_name} in "'bios'" | "'otaefi'" | "'otaboot'" | "'otaboot_b'") ilog "skipping ${part_name} on partition ${part_number} of device ${dev}" continue ;; *) dlog "wipe candidate ${part_name} on partition ${part_number} of device ${dev}" ;; esac fi part=$(get_part_prefix "${dev}")$part_number if [ "${controller}" = true ] ; then # Skip if we already found a valid partition, look otherwise [ ${BACKUP_PART_FOUND} -eq 1 ] && continue ilog "Looking for platform-backup partition on $part from ... instdev=${INSTDEV} device=${inst_dev} persistent_device=${persistent_instdev}" sgdisk_part_info=$(sgdisk -i $part_number $dev) part_type_guid=$(echo "$sgdisk_part_info" | grep "$part_type_guid_str" | awk '{print $4;}') dlog "Examining part_number=${part_number}, by_dev=${by_dev}, dev=${dev}, part_type_guid: ${part_type_guid}" dlog "sgdisk_part_info: ${sgdisk_part_info}" dlog "BACKUP_PART_GUID: ${BACKUP_PART_GUID}" if [ "$dev" == "${inst_dev}" -a "$part_type_guid" == $BACKUP_PART_GUID ] ; then part_type_name=$(echo "$sgdisk_part_info" | grep "$part_type_name_str" | awk '{print $3,$4;}') BACKUP_PART_NAME=${part_type_name:1:-1} part_type_first=$(echo "$sgdisk_part_info" | grep "$part_type_first_str" | awk '{print $3;}') BACKUP_PART_FIRST=${part_type_first} part_type_end=$(echo "$sgdisk_part_info" | grep "$part_type_end_str" | awk '{print $3;}') BACKUP_PART_END=${part_type_end} part_type_size=$(echo "$sgdisk_part_info" | grep "$part_type_size_str" | awk '{print $3;}') BACKUP_PART_SIZE=${part_type_size} part_type_flags=$(echo "$sgdisk_part_info" | grep "$part_type_flags_str" | awk '{print $3;}') BACKUP_PART_FLAGS=${part_type_flags} ilog "Discovered persistent backup partition: ${part} [${BACKUP_PART_NAME}:${BACKUP_PART_FIRST}:${BACKUP_PART_END}:${BACKUP_PART_SIZE}:${part_type_guid}]" # Only keep a backup partition that is in the expected location # and contains a proper filesystem if [ "${part_number}" == "${BACKUP_PART_NO}" ] ; then part_fstype=$(exec_retry 5 0.5 "blkid -s TYPE -o value $part") if [ "${part_fstype}" == "ext4" ]; then BACKUP_PART_CURRENT_SIZE=$(parted -s ${part} unit MiB print | grep ${part} | awk '{print $3}' | sed 's/[^C0-9]*//g') BACKUP_PART_FOUND=1 ilog "Discovered persistent backup partition, ${part} [${BACKUP_PART_CURRENT_SIZE} MiB], is in the expected location and is formatted correctly. Maintaining..." continue else ilog "Discovered persistent backup partition, ${part}, has a missing 'ext4' filesystem . Recreating..." fi else # Make sure we only recreate the backup partition on systems that are # known to be invalid. Detect a potential switch in BIOS vs. UEFI and # exit with an appropriate message. ilog "Discovered persistent backup partition, ${part}, is in an unexpected location. Expected on partition ${BACKUP_PART_NO}." if [ "$USE_UEFI_PARTITIONS" = 0 ] ; then # BIOS boot... if [ "${part_number}" == "${BACKUP_PART_UEFI}" ] ; then # Found a UEFI location for platform backup report_failure_with_msg "BIOS booted system has a persistent backup partition in a UEFI expected location. Wipe disks or boot system in UEFI mode." else ilog "BIOS booted system has an invalid installation. Recreating " fi else # UEFI boot... if [ "${part_number}" == "${BACKUP_PART_BIOS}" ] ; then # Found a BIOS location for platform backup report_failure_with_msg "UEFI booted system has a persistent backup partition in a BIOS expected location. Wipe disks or boot system in BIOS mode." else ilog "UEFI booted system has an invalid installation. Recreating " fi fi fi fi fi if [ "${WIPE_CEPH_OSDS}" = "true" ] && ([ "${part_type_guid}" = "${CEPH_JOURNAL_GUID}" ] || [ "${part_type_guid}" = "${CEPH_MPATH_JOURNAL_GUID}" ]); then # Journal partitions require additional wiping. Based on the ceph-manage-journal.py # script in the integ repo (at the ceph/ceph/files/ceph-manage-journal.py location) # wiping 100MB of data at the beginning of the partition should be enough. We also # wipe 100MB at the end, just to be safe. ilog "Wiping Ceph ${part_name} on ${part} start and end with dd" dd if=/dev/zero of=$part bs=1M count=100 2>/dev/null dd if=/dev/zero of=$part bs=1M count=100 seek=$(( `blockdev --getsz $part` / (1024 * 2) - 100 )) 2>/dev/null else ilog "Wiping ${part_name} on ${part} start and end with dd" dd if=/dev/zero of=$part bs=512 count=34 2>/dev/null dd if=/dev/zero of=$part bs=512 count=34 seek=$((`blockdev --getsz $part` - 34)) 2>/dev/null fi done if [ ${BACKUP_PART_FOUND} -eq 0 -o "${dev}" != "${inst_dev}" ] ; then ilog "Creating disk label for $dev" parted -s $dev mktable gpt ilog "... done" fi done ilog "Ensure any LAT installer root/boot partitions are zapped/wiped" for oldrootlabel in otaroot otaroot_1 otaroot_b otaroot_b_1 ; do oldrootpart=$(blkid --label $oldrootlabel) [ -z "$oldrootpart" ] && continue oldinstdev=/dev/$(lsblk $oldrootpart -n -o pkname) ilog "... destroying ${oldrootpart} on ${oldinstdev}" # sgdisk - Command-line GUID partition table (GPT) manipulator # Zap the entire partition ilog "... zapping ${oldinstdev}" sgdisk -Zo ${oldinstdev} # partprobe - inform the OS of partition table changes # root@(none):/# partprobe /dev/sda -s # /dev/sda: gpt partitions 1 2 3 4 5 6 ilog "... probing ${oldinstdev}" partprobe ${oldinstdev} # wipefs - wipe a signature from a device ilog "... wiping ${oldinstdev}" wipefs --all --backup ${oldinstdev} done # Override installer variable to not prompt for erasing the disk export INSTW=0 # If multi-drivers-switch= is in boot parameters then we need to revert the # kernel modules to the legacy version. This is a workaround for the LAT # /install script not supporting multi-drivers-switch driver_version= if grep -s -q '\smulti-drivers-switch=' /proc/cmdline ; then for arg in $(cat /proc/cmdline); do case "${arg}" in multi-drivers-switch=*) driver_version=${arg##*=} break ;; esac done # Only proceed if we have a valid driver_version if [ -n "${driver_version}" ] && \ [ -f "/lib/modules/$(uname -r)/extra/ice-${driver_version}/ice.ko" ] && \ [ -f "/lib/modules/$(uname -r)/extra/i40e-${driver_version}/i40e.ko" ] && \ [ -f "/lib/modules/$(uname -r)/extra/iavf-${driver_version}/iavf.ko" ]; then ilog "Found multi-drivers-switch: replacing ice/i40e/iavf with driver_version='${driver_version}'" modprobe -r ice modprobe -r i40e modprobe -r iavf sleep 2 insmod "/lib/modules/$(uname -r)/extra/ice-${driver_version}/ice.ko" insmod "/lib/modules/$(uname -r)/extra/i40e-${driver_version}/i40e.ko" insmod "/lib/modules/$(uname -r)/extra/iavf-${driver_version}/iavf.ko" sleep 2 ilog "Finished multi-drivers-switch module replacement" else elog "Found multi-drivers-switch but no modules exist for driver_version='${driver_version}' (ignoring)" fi fi ilog "Setting up initial IP address for ostree pull" parse_miniboot_network_params mgmt_dev=${BOOTPARAM_IFNAME} mgmt_vlan=${BOOTPARAM_VLAN} mgmt_address_family=${BOOTPARAM_MGMT_ADDRESS_FAMILY} if [ -z "${mgmt_vlan}" ] ; then # NO VLAN if [ "$mgmt_address_family" = "inet" ]; then ilog "ip ${BOOTPARAM_IP_VER} address add ${BOOTPARAM_IP_ADDR}/${BOOTPARAM_PREFIX_LEN} dev ${mgmt_dev}" ip ${BOOTPARAM_IP_VER} address add ${BOOTPARAM_IP_ADDR}/${BOOTPARAM_PREFIX_LEN} dev ${mgmt_dev} else # BOOTPARAM_PREFIX_LEN should not be empty, but guard against it: if [ -z "${BOOTPARAM_PREFIX_LEN}" ]; then ilog "ip ${BOOTPARAM_IP_VER} address add ${BOOTPARAM_IP_ADDR} dev ${mgmt_dev}" ip ${BOOTPARAM_IP_VER} address add ${BOOTPARAM_IP_ADDR} dev ${mgmt_dev} else ilog "ip ${BOOTPARAM_IP_VER} address add ${BOOTPARAM_IP_ADDR}/${BOOTPARAM_PREFIX_LEN} dev ${mgmt_dev}" ip ${BOOTPARAM_IP_VER} address add ${BOOTPARAM_IP_ADDR}/${BOOTPARAM_PREFIX_LEN} dev ${mgmt_dev} fi fi ilog "ip ${BOOTPARAM_IP_VER} link set dev ${mgmt_dev} up" ip ${BOOTPARAM_IP_VER} link set dev ${mgmt_dev} up if [ -z "${BOOTPARAM_GW}" ]; then # No gateway ilog "ip ${BOOTPARAM_IP_VER} route add default dev ${mgmt_dev} ${BOOTPARAM_METRIC}" ip ${BOOTPARAM_IP_VER} route add default dev ${mgmt_dev} ${BOOTPARAM_METRIC} else ilog "Setting up default route:" ilog "ip ${BOOTPARAM_IP_VER} route add default via ${BOOTPARAM_GW} dev ${mgmt_dev} ${BOOTPARAM_METRIC}" ip ${BOOTPARAM_IP_VER} route add default via ${BOOTPARAM_GW} dev ${mgmt_dev} ${BOOTPARAM_METRIC} fi wait_for_interface ${mgmt_dev} 60 ilog "ip addr:" ip addr show ilog "ip route:" ip ${BOOTPARAM_IP_VER} route show else # VLAN CONFIG mgmt_iface=vlan${mgmt_vlan} ilog "mgmt_dev=${mgmt_dev}" ilog "mgmt_iface=vlan${mgmt_vlan}" ilog "mgmt_address_family: ${mgmt_address_family}" ilog "ip ${BOOTPARAM_IP_VER} link add link ${mgmt_dev} name $mgmt_iface type vlan id ${mgmt_vlan}" ip ${BOOTPARAM_IP_VER} link add link ${mgmt_dev} name $mgmt_iface type vlan id ${mgmt_vlan} if [ "${mgmt_address_family}" = "inet" ]; then ilog "ip ${BOOTPARAM_IP_VER} address add ${BOOTPARAM_IP_ADDR}/${BOOTPARAM_PREFIX_LEN} dev ${mgmt_iface}" ip ${BOOTPARAM_IP_VER} address add ${BOOTPARAM_IP_ADDR}/${BOOTPARAM_PREFIX_LEN} dev ${mgmt_iface} else # BOOTPARAM_PREFIX_LEN should not be empty, but guard against it: if [ -z "${BOOTPARAM_PREFIX_LEN}" ]; then ilog "ip ${BOOTPARAM_IP_VER} address add ${BOOTPARAM_IP_ADDR} dev ${mgmt_iface}" ip ${BOOTPARAM_IP_VER} address add ${BOOTPARAM_IP_ADDR} dev ${mgmt_iface} else ilog "ip ${BOOTPARAM_IP_VER} address add ${BOOTPARAM_IP_ADDR}/${BOOTPARAM_PREFIX_LEN} dev ${mgmt_iface}" ip ${BOOTPARAM_IP_VER} address add ${BOOTPARAM_IP_ADDR}/${BOOTPARAM_PREFIX_LEN} dev ${mgmt_iface} fi fi ilog "ip ${BOOTPARAM_IP_VER} link set up dev ${mgmt_dev}" ip ${BOOTPARAM_IP_VER} link set up dev ${mgmt_dev} wait_for_interface ${mgmt_dev} 60 ilog "ip ${BOOTPARAM_IP_VER} link set up dev ${mgmt_iface}" ip ${BOOTPARAM_IP_VER} link set up dev ${mgmt_iface} wait_for_interface ${mgmt_iface} 60 if [ -z "${BOOTPARAM_GW}" ]; then # No gateway ilog "ip ${BOOTPARAM_IP_VER} route add default dev ${mgmt_iface} ${BOOTPARAM_METRIC}" ip ${BOOTPARAM_IP_VER} route add default dev ${mgmt_iface} ${BOOTPARAM_METRIC} else ilog "Setting up default route:" ilog "ip ${BOOTPARAM_IP_VER} route add default via ${BOOTPARAM_GW} dev ${mgmt_iface} ${BOOTPARAM_METRIC}" ip ${BOOTPARAM_IP_VER} route add default via ${BOOTPARAM_GW} dev ${mgmt_iface} ${BOOTPARAM_METRIC} fi ilog "ip ${BOOTPARAM_IP_VER} addr:" ip ${BOOTPARAM_IP_VER} addr show ilog "ip ${BOOTPARAM_IP_VER} route:" ip ${BOOTPARAM_IP_VER} route show fi # get the nameserver local dns="none" for e in \${dns}; do echo "nameserver \${e}" > /etc/resolv.conf done true %end ########################################################################### %part --interpreter=/bin/bash HOOK_LABEL=" part" . /tmp/lat/ks_functions.sh ilog "*****************************************" ilog "*** Partition - Partition Disks ***" ilog "*****************************************" inst_dev=$(get_disk "${INSTDEV}") ########################################################### # From pre_disk_controller.cfg ########################################################### function check_partitioning_status() { start_sec=$(($end_sec+1)) part_no=$((part_no+1)) if [ $start_sec -gt $last ] ; then report_failure_with_msg "Disk is not big enough for requested layout (start_sec: $start_sec, last: $last)" fi } if [ "$BIOSPLUSEFI" = 1 ] ; then ilog "BIOSPLUSEFI=1 configuration is requested" if [ "${controller}" = true -a "$USE_UEFI_PARTITIONS" = 1 ] ; then ilog "WARNING: UEFI booted and installed controllers will NOT have a BIOS MBR partition due to partitioning patterns established in previous releases." fi fi MIB_BYTES=$((1024*1024)) # Start common partitioning regardless of personality sgdisk_parts="" # Get the logical sector size used for determining partition boundaries LOGICAL_SECTOR_SZ=`lsblk -n ${inst_dev} -o LOG-SEC -d` # Zap the GPT/MBR information sgdisk -Z ${inst_dev} # Get the first aligned sector first=`sgdisk -F ${inst_dev} | grep -v Creating` # Get the last aligned sector export last=$(sgdisk -E ${inst_dev} 2>/dev/null |grep -v Creating) ilog "Allocate host partitions on ${inst_dev} with first sector: $first and last sector: $last" # Maintain BIOS partition mappings from previous releases start_sec=$first part_no=1 if [ "$USE_UEFI_PARTITIONS" = 0 -o "${controller}" = false ] ; then # 1MB size for BIOS boot partition BIOSSZ=1 end_sec=$(($start_sec+(${BIOSSZ}*${MIB_BYTES}/${LOGICAL_SECTOR_SZ})-1)) sgdisk_parts="$sgdisk_parts -n $part_no:$start_sec:$end_sec -c $part_no:bios -t $part_no:EF02" check_partitioning_status fi if [ "${controller}" = true ] ; then if [ "${aio}" = true ] ; then get_aio_controller_provisioning_sizes ilog "AIO Controller: MINIMIZING root disk space allocation" else get_std_controller_provisioning_sizes ilog "STD Controller: MAXIMIZING root disk space allocation" fi # Only controllers have a persistent backup partition # Use current partition size if it has been detected if [ ${BACKUP_PART_CURRENT_SIZE} -gt 0 ]; then BACKUP_SIZE=${BACKUP_PART_CURRENT_SIZE} else BACKUP_SIZE=${BACKUP_DEFAULT_PERSISTENT_SIZE} fi export BACKUP_SIZE # Check for a bootline override and allocate platform backup partition if [ -z "$persistent_size" ]; then # Default backup partition size in MiB ilog "Platform Backup persistent size not on command line ; defaulting to ${BACKUP_SIZE}" else ilog "Using Platform Backup persistent size from boot command: ${persistent_size}" BACKUP_SIZE=${persistent_size} fi backup_part_extension_required=0 if [ ${BACKUP_PART_CURRENT_SIZE} -gt 0 ]; then # Reconcile current backup partition size against BACKUP_SIZE if [ ${BACKUP_SIZE} -eq ${BACKUP_PART_CURRENT_SIZE} ] ; then ilog "Platform Backup partition size is unchanged: ${BACKUP_SIZE} MiB." elif [ ${BACKUP_SIZE} -gt ${BACKUP_PART_CURRENT_SIZE} ] ; then # We need to extend the existing partition - this is done after the partitions are recreated backup_part_extension_required=1 else # Do not allow shrinking of backup partition report_failure_with_msg "Cannot shrink platform backup smaller than existing ${BACKUP_PART_CURRENT_SIZE} MiB" fi fi ilog "Platform Backup partition size: ${BACKUP_SIZE}" if [ ${BACKUP_PART_FOUND} -eq 0 ] ; then ilog "Platform Backup partition not detected: CREATING" else ilog "Platform Backup Partition was detected: PERSISTING" fi dlog "BACKUP_SIZE=${BACKUP_SIZE} after persistent_size=${persistent_size}, backup_part_extension_required=${backup_part_extension_required}" end_sec=$(($start_sec+(${BACKUP_SIZE}*${MIB_BYTES}/${LOGICAL_SECTOR_SZ})-1)) sgdisk_parts="$sgdisk_parts -n $part_no:$start_sec:$end_sec -c $part_no:${BACKUP_PART_LABEL} -t $part_no:${BACKUP_PART_GUID}" check_partitioning_status elif [ "${worker}" = true ] ; then ilog "Setting up platform_pv partition sizes for worker node" get_worker_provisioning_sizes elif [ "${storage}" = true ] ; then ilog "Setting up platform_pv partition sizes for storage node" get_storage_provisioning_sizes fi ilog "PART_SZ_EFI : ${PART_SZ_EFI}" ilog "PART_SZ_BOOT : ${PART_SZ_BOOT}" ilog "PART_SZ_ROOT : ${PART_SZ_ROOT}" # 300 MiB size for EFI boot partition to align with previous releases end_sec=$(($start_sec+(${PART_SZ_EFI}*${MIB_BYTES}/${LOGICAL_SECTOR_SZ})-1)) sgdisk_parts="$sgdisk_parts -n $part_no:$start_sec:$end_sec -c $part_no:otaefi -t $part_no:EF00" check_partitioning_status # Boot/Root OSTree Partition A (Note: OSTree Partition B not used) if [ "${PART_SZ_BOOT}" != 0 ] ; then end_sec=$(($start_sec+(${PART_SZ_BOOT}*${MIB_BYTES}/${LOGICAL_SECTOR_SZ})-1)) sgdisk_parts="$sgdisk_parts -n $part_no:$start_sec:$end_sec -c $part_no:otaboot" check_partitioning_status fi if [ "${PART_SZ_ROOT}" != 0 ] ; then if [ "$INSTAB" = 0 -a "${INSTFLUX}" = 0 ] ; then if [ "$VSZ" = 0 ] ; then report_failure_with_msg "Installation with VSZ=0 is not supported." else end_sec=$(($start_sec+(${PART_SZ_ROOT}*${MIB_BYTES}/${LOGICAL_SECTOR_SZ})-1)) fi sgdisk_parts="$sgdisk_parts -n $part_no:$start_sec:$end_sec -c $part_no:otaroot" else end_sec=$(($start_sec+(${PART_SZ_ROOT}*${MIB_BYTES}/${LOGICAL_SECTOR_SZ})-1)) sgdisk_parts="$sgdisk_parts -n $part_no:$start_sec:$end_sec -c $part_no:otaroot" fi check_partitioning_status fi # Flux Partition if [ "${LV_SZ_VAR}" = 0 -a "${INSTFLUX}" = 1 ] ; then if [ "$VSZ" = 0 ] ; then report_failure_with_msg "Installation with VSZ=0 is not supported." else end_sec=$(($start_sec+(${VSZ}*${MIB_BYTES}/${LOGICAL_SECTOR_SZ})-1)) fi sgdisk_parts="$sgdisk_parts -n $part_no:$start_sec:$end_sec -c $part_no:fluxdata" check_partitioning_status fi # Allocate platform pv ilog "platform_pv partition - using all remaining disk space" end_sec=$last sgdisk_parts="$sgdisk_parts -n $part_no:$start_sec:$end_sec -c $part_no:platform_pv -t $part_no:8E00" STOR_DEVS=$(echo "$STOR_DEVS" | xargs -n 1 | sort -u | xargs) [ -z "$STOR_DEVS" ] && report_failure_with_msg "No storage devices available." ilog "STOR_DEV_FDS Updated ; $STOR_DEV_FDS" # CREATE PARTITIONS dlog "Requesting ${inst_dev} Partition Table: ${a}" dlog "Executing: sgdisk ${sgdisk_parts} -p ${inst_dev}" sgdisk $sgdisk_parts -p ${inst_dev} rc=$? [ ${rc} -ne 0 ] && report_failure_with_msg "sgdisk failed to create partitions: ${a} [rc=${rc}]" if [ "${backup_part_extension_required}" -ne 0 ]; then instdev_part_prefix=$(get_part_prefix "${inst_dev}") # The backup partition has been increased via persistent_size. # Extend the partition and resize the FS wlog "Platform Backup partition: resizing ${instdev_part_prefix}${BACKUP_PART_NO} from ${BACKUP_PART_CURRENT_SIZE}MiB to ${BACKUP_SIZE}MiB" e2fsck -p -f ${instdev_part_prefix}${BACKUP_PART_NO} rc=$? # Handle e2fsck exit code, non-zero can still indicate success: # 0 - No errors # 1 - File system errors corrected # 2 - File system errors corrected, system should be rebooted # > 2 are all hard failures (see man e2fsck) # Include 2 as a failure in our case, since it should only happen if the filesystem # is mounted while e2fsck is run (not a valid scenario here). [ ${rc} -gt 1 ] && report_failure_with_msg "e2fsck failed on platform backup partition [rc=${rc}]" resize2fs -f ${instdev_part_prefix}${BACKUP_PART_NO} rc=$? [ ${rc} -ne 0 ] && report_failure_with_msg "Failed to resize ext4 fs of platform backup partition [rc=${rc}]" fi true %end ########################################################################### %mkfs --interpreter=/bin/bash HOOK_LABEL="mkfs" . /tmp/lat/ks_functions.sh ilog "***************************************************" ilog "*** Mkfs - Format Partitions & LVM Volumes ***" ilog "***************************************************" ####################################################### # From pre_disk_aio ###################################################### vg="volume group" lv="logical volume" dev=$(get_disk "${INSTDEV}") dev_part_prefix=$(get_part_prefix "${dev}") if [ "${controller}" = true ] ; then if [ "${aio}" = true ] ; then get_aio_controller_provisioning_sizes else get_std_controller_provisioning_sizes fi else report_failure_with_msg "Unsupported install type: only Standard or All-in-one is supported" fi # Maintain BIOS partition mappings from previous releases part_no=1 if [ "$USE_UEFI_PARTITIONS" = 0 -o "${controller}" = false ] ; then # No formating for the BIOS boot partition part_no=$((part_no+1)) fi if [ "${controller}" = true ] ; then ilog "BACKUP_SIZE : ${BACKUP_SIZE}" ilog "BACKUP_PART_NO : ${BACKUP_PART_NO}" ilog "BACKUP_PART_LABEL : ${BACKUP_PART_LABEL}" ilog "BACKUP_PART_GUID : ${BACKUP_PART_GUID}" ilog "BACKUP_PART : ${dev_part_prefix}${BACKUP_PART_NO}" # Only init Platform Backup partition filesystem if the partition was just created if [ ${BACKUP_PART_FOUND} -eq 0 ] ; then ilog "Platform Backup Partition was CREATED. Initialize filesystem on ${dev_part_prefix}${BACKUP_PART_NO}" mkfs.ext4 -F -L ${BACKUP_PART_LABEL} ${dev_part_prefix}${BACKUP_PART_NO} [ ${?} -ne 0 ] && report_failure_with_msg "Failed Platform Backup partition filesystem init ${dev_part_prefix}${BACKUP_PART_NO}" else # Preserving the contents of the backup partition, but make sure it's labeled correctly e2label ${dev_part_prefix}${BACKUP_PART_NO} ${BACKUP_PART_LABEL} fi part_no=$((part_no+1)) fi # Maintain UEFI partition mappings from previous releases mkfs.vfat -n otaefi ${dev_part_prefix}${part_no} [ ${?} -ne 0 ] && report_failure_with_msg "Failed UEFI filesystem init: ${dev_part_prefix}${part_no}, rc=${?}" part_no=$((part_no+1)) # Boot/Root OSTree Partition A (Note: OSTree Partition B not used) if [ "${PART_SZ_BOOT}" != 0 ] ; then mkfs.ext4 -F -L otaboot ${dev_part_prefix}${part_no} [ ${?} -ne 0 ] && report_failure_with_msg "Failed Boot filesystem init: ${dev_part_prefix}${part_no}, rc=${?}" part_no=$((part_no+1)) fi if [ "${PART_SZ_ROOT}" != 0 ] ; then mkfs.ext4 -F -L otaroot ${dev_part_prefix}${part_no} [ ${?} -ne 0 ] && report_failure_with_msg "Failed Root filesystem init: ${dev_part_prefix}${part_no}, rc=${?}" part_no=$((part_no+1)) fi # Flux Partition if [ "${LV_SZ_VAR}" = 0 -a "${INSTFLUX}" = 1 ] ; then mkfs.ext4 -F -L fluxdata ${dev_part_prefix}${part_no} [ ${?} -ne 0 ] && report_failure_with_msg "Failed Fluxdata (/var) filesystem init: ${dev_part_prefix}${part_no}, rc=${?}" part_no=$((part_no+1)) fi # Log important LVM config settings log_lvm_conf "Installer Initial" /etc/lvm/lvm.conf # Create Volume Group pv_part=${dev_part_prefix}${part_no} ilog "Install disk: ${INSTDEV}" ilog "Current disk: ${dev} ; current partition index: $part_no" ilog "LV_SZ_LOG (cgts--vg-log--lv size): ${LV_SZ_LOG} MB" ilog "LV_SZ_ROOT (cgts--vg-root--lv) : ${LV_SZ_ROOT} MB" ilog "LV_SZ_SCRATCH (cgts--vg-scratch--lv) : ${LV_SZ_SCRATCH} MB" ilog "LV_SZ_VAR (cgts--vg-var--lv) : ${LV_SZ_VAR} MB" ilog "Wipe any previous signatures from the platform physical volume ${pv_part}" wipefs -a ${pv_part} [ ${?} -ne 0 ] && report_failure_with_msg "Failed to wipe signatures from ${pv_part}, rc=${?}" ilog "Create ${vg} 'cgts-vg' ${pv_part} ; $STOR_DEV_FDS" exec_no_fds "$STOR_DEV_FDS" "vgcreate -y --force cgts-vg ${pv_part} 2>/dev/null" 5 0.5 [ ${?} -ne 0 ] && report_failure_with_msg "Failed to create ${vg} 'cgts-vg' ${pv_part}" if [ "${LV_SZ_ROOT}" != 0 ] ; then # Create and Init the '/' logical volume ilog "Create ${lv} 'root-lv' ; $STOR_DEV_FDS" exec_no_fds "$STOR_DEV_FDS" "lvcreate -y -Wy -Zy -n root-lv --size ${LV_SZ_ROOT}MB cgts-vg 2>/dev/null" 5 0.5 [ ${?} -ne 0 ] && report_failure_with_msg "Failed to create ${lv} 'root-lv'" ilog "InitFs ${lv} 'root-lv'" mkfs.ext4 -F /dev/cgts-vg/root-lv [ ${?} -ne 0 ] && report_failure_with_msg "Failed to init ${lv} 'root-lv'" fi if [ "${LV_SZ_VAR}" != 0 ] ; then # Create and Init the '/' logical volume ilog "Create ${lv} 'var-lv' ; $STOR_DEV_FDS" exec_no_fds "$STOR_DEV_FDS" "lvcreate -y -Wy -Zy -n var-lv --size ${LV_SZ_ROOT}MB cgts-vg 2>/dev/null" 5 0.5 [ ${?} -ne 0 ] && report_failure_with_msg "Failed to create ${lv} 'root-lv'" ilog "InitFs ${lv} 'var-lv'" mkfs.ext4 -F /dev/cgts-vg/var-lv [ ${?} -ne 0 ] && report_failure_with_msg "Failed to init ${lv} 'root-lv'" fi # Create and Init the '/var/log' logical volume ilog "Create ${lv} 'log-lv' ; $STOR_DEV_FDS" exec_no_fds "$STOR_DEV_FDS" "lvcreate -y -Wy -Zy -n log-lv --size ${LV_SZ_LOG}MB cgts-vg 2>/dev/null" 5 0.5 [ ${?} -ne 0 ] && report_failure_with_msg "Failed to create ${lv} 'log-lv'" ilog "InitFs ${lv} 'log-lv'" mkfs.ext4 -F /dev/cgts-vg/log-lv [ ${?} -ne 0 ] && report_failure_with_msg "Failed to init ${lv} 'log-lv'" # Create and init the '/scratch' logical volume ilog "Create ${lv} 'scratch-lv' ; $STOR_DEV_FDS" exec_no_fds "$STOR_DEV_FDS" "lvcreate -y -Wy -Zy -n scratch-lv --size ${LV_SZ_SCRATCH}MB cgts-vg 2>/dev/null" 5 0.5 [ ${?} -ne 0 ] && report_failure_with_msg "Failed to create ${lv} 'scratch-lv'" ilog "InitFs ${lv} 'scratch-lv'" mkfs.ext4 -F /dev/cgts-vg/scratch-lv [ ${?} -ne 0 ] && report_failure_with_msg "Failed to init ${lv} 'scratch-lv'" ####################################################################### # From post_lvm_on_rootfs.cfg (all hosts) ####################################################################### # uncomment the global_filter line in lvm.conf perl -0777 -i.bak -pe 's:(# This configuration option has an automatic default value\.\n)\t# global_filter:$1 global_filter:m' /etc/lvm/lvm.conf perl -0777 -i -pe 's:(# Example\n)\t# preferred_names:$1 preferred_names:m' /etc/lvm/lvm.conf # Get the LVM disk partition and add it to the lvm.conf file export LV_ROOTDISK=$(exec_no_fds "$STOR_DEV_FDS" "pvdisplay --select 'vg_name=cgts-vg' -C -o pv_name --noheadings" | xargs) [ -z ${LV_ROOTDISK} ] && report_failure_with_msg "Failed to identify logical volume rootdisk via pvdisplay" # Edit the LVM config so LVM only looks for LVs on ${LV_ROOTDISK} ilog "Edit the LVM config so LVM only looks for LVs on the root disk" sed -i "s#^\( *\)global_filter = \[.*#\1global_filter = [ \"a|${LV_ROOTDISK}|\", \"r|.*|\" ]#" /etc/lvm/lvm.conf # Log important LVM config settings log_lvm_conf "Installer Updated" /etc/lvm/lvm.conf ##################################################################### # From pre_disk_setup_tail.cfg ##################################################################### # Close all FDs and wait for udev to reshuffle all partitions. ilog "Releasing storage device locks and FDs." for fd in $STOR_DEV_FDS do flock -u "$fd" exec {fd}>&- done sleep 2 udevadm settle --timeout=300 || report_failure_with_msg "udevadm settle failed" #lsblk -o name,mountpoint,label,size,uuid # Rescan LVM cache to avoid warnings for VGs that were recreated. pvscan --cache 2>/dev/null # Stage the ostree_repo in /sysroot for network installations # of controller nodes. Doing so avoids a double ostree pull of # the huge ostree_repo over the network. if is_usb_install -eq 0 ; then ilog "USB Install" else ilog "Network Install" ################################################################## # # System node installs of worker and storage nodes are installed # over the network rather than from a staged archive. # This is because these node types do not have/need a local feed. # ################################################################## if [ "${controller}" = true ] ; then ilog "Controller Install" ############################################################## # # Controller node network installs pull the ostree_repo from # the pxeboot server's feed directory in 'archive' mode into # /sysroot as a local staging location. In this case LAT's # INSTL (install) variable is updated to install from that # local stage. # # This is done to avoid a second (double) ostree_repo pull # over the network that would otherwise be needed to populate # the controller's feed directory. # # This staged ostree_repo archive is later moved to the # controller's feed directory to be used for future installs # of other system nodes from this controller. # ############################################################## ilog "OSTREE_ROOT_DEVICE: ${OSTREE_ROOT_DEVICE}" ilog "OSTREE_VAR_DEVICE : ${OSTREE_VAR_DEVICE}" PHYS_SYSROOT="/sysroot" mkdir -p ${PHYS_SYSROOT} mount -o rw,noatime "${OSTREE_ROOT_DEVICE}" "${PHYS_SYSROOT}" || elog "Error mounting ${OSTREE_ROOT_DEVICE}" repo="${PHYS_SYSROOT}/var/www/pages/feed/rel-xxxPLATFORM_RELEASExxx/ostree_repo" mkdir -p "${repo}" # If we have already prestaged ostree_repo in /opt/platform-backup, # then we should use that repo instead of downloading off of the system controller. backup_device=/dev/disk/by-partlabel/platform_backup backup_mount=/tmp/platform-backup backup_mount_release="${backup_mount}"/xxxPLATFORM_RELEASExxx ilog "Temporary backup mount: ${backup_mount}, release: ${backup_mount_release}" mkdir -p "${backup_mount}" mount "${backup_device}" "${backup_mount}" 2>/dev/null # If ostree_repo is found at the mounted backup directory, # then set the ostree url to its location. remote_insturl= if [ -e ${backup_mount_release}/ostree_repo ]; then local_repo_check_fail= # Calculate local checksum and compare checksum_file=${backup_mount_release}/.ostree_repo_checksum if [ -f "${checksum_file}" ]; then checksum_from_file=$(cat "${checksum_file}") ilog "Verifying checksum for prestaged ${backup_mount_release}/ostree_repo" pushd ${backup_mount_release} > /dev/null checksum=$(find ostree_repo -type f -exec md5sum {} + | LC_ALL=C sort | md5sum | awk '{ print $1; }') popd > /dev/null if [ "${checksum}" = "${checksum_from_file}" ]; then ilog "Verified ostree checksum: ${checksum}" else elog "ostree checksum failed on ${backup_mount_release}/ostree_repo" elog "Calulated checksum: ${checksum}" elog "File checksum: ${checksum_from_file}" local_repo_check_fail=true fi else # No prestage checksum file is available. Use ostree fsck instead. # The only problem with this is the length of time required for fsck to complete. wlog "No ostree checksum file at ${checksum_file}. Performing ostree fsck instead." if ! ostree --repo="${backup_mount_release}/ostree_repo" fsck; then elog "ostree fsck failed on prestaged ${backup_mount_release}/ostree_repo: reverting to remote pull" local_repo_check_fail=true fi fi if [ -z "${local_repo_check_fail}" ]; then # Preserve remote_insturl for use in 2nd ostree pull below remote_insturl=${insturl} insturl="file:///${backup_mount_release}/ostree_repo" ilog "Setting insturl to ${insturl} to use prestaged ostree_repo" else # Remove the corrupted ostree_repo. # Avoid setting insturl which will revert to using a remote pull elog "ostree integrity check failed: removing prestaged ${backup_mount_release}/ostree_repo" rm -rf "${backup_mount_release}/ostree_repo" elog "ostree integrity check failed: reverting to remote pull" fi fi # Tell LAT to install from this local stage # i.e. override where LAT installs from. export instl=${repo} export INSTL=${instl} ostree --repo=${repo} init --mode=archive if [ "${insturl}" = "file://NOT_SET" ] ; then ilog "ostree_repo archive pull from file:///instboot/ostree_repo" ostree --repo=${repo} remote add ${instbr} file:///instboot/ostree_repo else ilog "ostree_repo archive pull from ${insturl}" ostree --repo=${repo} remote add ${instbr} ${insturl} fi # Check for noverifyssl in boot arguments. # Note: even if noverifyssl is not set, we still don't have proper support # for SSL certificates (which would require configuring cert paths here). if grep -q noverifyssl /proc/cmdline 2>/dev/null; then ilog "Configuring ostree for unverified SSL" ostree config --repo=${repo} set "remote \"${instbr}\"".tls-permissive true fi # Check for instgpg=0 in boot arguments. if grep -q 'instgpg=0' /proc/cmdline 2>/dev/null; then ilog "Configuring ostree for unverified GPG (gpg-verify=false)" ostree config --repo=${repo} set "remote \"${instbr}\"".gpg-verify false fi ilog "Executing: ostree --repo=${repo} pull --depth=-1 --mirror ${instbr}:${instbr}" ostree --repo=${repo} pull --depth=-1 --mirror ${instbr}:${instbr} rc=$? if [ $rc -ne 0 ]; then report_failure_with_msg "ostree pull failed, rc=$rc" fi if [ -n "${remote_insturl}" ]; then # In this case, we've initialized our ostree repo from local disk # store - either via prestaging or due to installing from ISO. # We now perform an extra ostree pull from the system controller # in order to pick up any patch commits. ilog "ostree_repo archive pull from ${remote_insturl} for patch commits" # Set feed ostree remote "starlingx" to point to active controller's feed ostree repo ilog "Replacing ostree feed remote with: ${remote_insturl} ${instbr}" ostree --repo=${repo} remote delete ${instbr} ostree --repo=${repo} remote add ${instbr} ${remote_insturl} ${instbr} if grep -q noverifyssl /proc/cmdline 2>/dev/null; then ilog "Configuring ostree for unverified SSL" ostree config --repo=${repo} set "remote \"${instbr}\"".tls-permissive true fi if grep -q 'instgpg=0' /proc/cmdline 2>/dev/null; then ilog "Configuring ostree for unverified GPG (gpg-verify=false)" ostree config --repo=${repo} set "remote \"${instbr}\"".gpg-verify false fi ilog "Executing ostree pull from ${remote_insturl}:" ilog "ostree --repo=${repo} pull --depth=-1 --mirror ${instbr}:${instbr}" ostree --repo=${repo} pull --depth=-1 --mirror ${instbr}:${instbr} rc=$? if [ $rc -ne 0 ]; then report_failure_with_msg "ostree pull failed, rc=$rc" fi fi ilog "ostree log for ${repo}, branch=${instbr}:" ostree --repo=${repo} log ${instbr} umount ${backup_mount} umount ${PHYS_SYSROOT} fi fi # Important: To align with installer expectations of where otaefi will reside, # reset the value of p1 if [ "${controller}" = true ] ; then if [ "$USE_UEFI_PARTITIONS" = 0 ] ; then # BIOS firmware execution # Number Start (sector) End (sector) Size Code Name # 1 2048 4095 1024.0 KiB EF02 bios # 2 4096 61444095 29.3 GiB FFFF platform_backup # 3 61444096 62058495 300.0 MiB EF00 otaefi # p1=3 else # UEFI firmware execution # Number Start (sector) End (sector) Size Code Name # 1 2048 61442047 29.3 GiB FFFF platform_backup # 2 61442048 62056447 300.0 MiB EF00 otaefi p1=2 # LAT installer will attempt to write the legacy BIOS grub information # after exiting from this hook. Skip it, in this case, as we don't have # a BIOS boot partition export BIOSPLUSEFI=0 fi elif [ "${worker}" = true -o "${storage}" = true ] ; then # UEFI and BIOS firmware execution # Number Start (sector) End (sector) Size Code Name # 1 2048 4095 1024.0 KiB EF02 bios # 2 4096 618495 300.0 MiB EF00 otaefi p1=2 fi # Important: Set fs_dev needed by the installer for mounting/updating the efi # partition fs_dev=${dev_part_prefix} true %end ########################################################################### %post --interpreter=/bin/bash HOOK_LABEL="post" . /tmp/lat/ks_functions.sh ilog "*********************************************************" ilog "**** Post - Add user/groups **" ilog "*********************************************************" # Set password for root to 'root' usermod -p '$6$hEv/K.fPeg/$ezIWhJPrMG3WtdEwqQRdyBwdYmPZkqW2PONFAcDd6TqWliYc9dHAwW4MFTlLanVH3/clE0/34FheDMpbAqZVG.' root # Remove admin user whether it exists or not deluser admin || true # Create the sysadmin user useradd sysadmin -m --shell /bin/bash -G sudo --password 4SuW8cnXFyxsk chage -d 0 sysadmin # add 'nobody' group groupadd nobody # Reload /etc/group- to make systemd-sysusers.service happy /usr/sbin/grpconv || report_failure_with_msg "Failed to convert from shadow passwords and groups" %end %post --interpreter=/bin/bash HOOK_LABEL="post" . /tmp/lat/ks_functions.sh ilog "*********************************************************" ilog "*** Post - Traits & Platform Config File update ***" ilog "*********************************************************" # Set node traits' state [ "${controller}" = true ] && ilog "Controller Function" [ "${storage}" = true ] && ilog "Storage Function" [ "${worker}" = true ] && ilog "Worker Function" [ "${lowlatency}" = true ] && ilog "Low Latency Function" [ "${controller}" = true -a ${worker} = true ] && aio=true # Parse traits to nodetype, subfunction and system_type # ----------------------------------------------------- # Set nodetype from traits if [ "${controller}" = true ] ; then nodetype=${TRAIT__CONTROLLER} elif [ "${storage}" = true ] ; then nodetype=${TRAIT__STORAGE} elif [ "${worker}" = true ] ; then nodetype=${TRAIT__WORKER} fi ilog "nodetype=${nodetype}" # Set system type and subfunction subfunction="" system_type="" [ "${controller}" = true -a "${worker}" = true ] && aio=true if [ "${aio}" = true ] ; then ilog "${SYSTEM_TYPE__AIO} System" system_type="${SYSTEM_TYPE__AIO}" subfunction="${SUBFUNCTION__AIO}" if [ "${lowlatency}" = true ] ; then ilog "Setting aio lowlatency" ln -s /usr/share/systemd-presets/lowlatency.preset /etc/systemd/system-preset/10-aio.preset else ln -s /usr/share/systemd-presets/aio.preset /etc/systemd/system-preset/10-aio.preset fi else ilog "${SYSTEM_TYPE__STANDARD} System" system_type="${SYSTEM_TYPE__STANDARD}" if [ "${worker}" = true ] ; then subfunction=${SUBFUNCTION__WORKER} if [ "${lowlatency}" = true ] ; then ilog "Setting ${SUBFUNCTION__WORKER} lowlatency" ln -s /usr/share/systemd-presets/worker-lowlatency.preset /etc/systemd/system-preset/10-${SUBFUNCTION__WORKER}.preset else ln -s /usr/share/systemd-presets/worker.preset /etc/systemd/system-preset/10-${SUBFUNCTION__WORKER}.preset fi elif [ "${storage}" = true ] ; then subfunction=${SUBFUNCTION__STORAGE} ilog "Setting ${SUBFUNCTION__STORAGE} preset" ln -s /usr/share/systemd-presets/storage.preset /etc/systemd/system-preset/10-${SUBFUNCTION__STORAGE}.preset else subfunction=${SUBFUNCTION__CONTROLLER} ilog "Setting ${SUBFUNCTION__CONTROLLER} preset" ln -s /usr/share/systemd-presets/controller.preset /etc/systemd/system-preset/10-${SUBFUNCTION__CONTROLLER}.preset fi fi if [ "${lowlatency}" = true ] ; then subfunction="${subfunction},${TRAIT__LOWLATENCY}" fi ilog "subfunction=${subfunction}" ilog "system_type=${system_type}" ################################################################# # From post_platform_conf_controller.cfg # From post_platform_conf_aio.cfg # From post_platform_conf_aio_lowlatency.cfg ################################################################# ilog "create platform.conf and set personality traits" [ ! -d "/etc/platform" ] && mkdir -p -m 0775 /etc/platform cat < ${PLATFORM_CONF} nodetype=${nodetype} subfunction=${subfunction} system_type=${system_type} EOF ilog "Create systemd presets and set personality traits" systemctl daemon-reload systemctl --preset-mode=full preset-all ############################################################## # From post_pxeboot_controller # From post_net_common.cfg # ############################################################ # Set http port # Persist the default http port number to platform configuration. # This will get overwritten when by manifest during sw configuration phase. if [[ "${insturl}" == *"http"* ]] ; then http_port=$(echo $(cat /proc/cmdline |xargs -n1 echo |grep '^insturl=' | sed -r 's#^[^/]*://[^/]*:([0-9]*)/.*#\1#')) else http_port=8080 fi update_platform_conf "http_port=${http_port}" ############################################################# # From post_common.cfg (all hosts) ############################################################# rm /etc/hostname # TODO: is this needed with LAT ?? # If using a serial install make sure to add a getty on the tty1 conarg=`cat /proc/cmdline |xargs -n1 echo |grep console= |grep ttyS` if [ -n "$conarg" ] ; then echo "1:2345:respawn:/sbin/mingetty tty1" >> /etc/inittab fi blkid >> ${LOGFILE} # TODO: See if other post_common.cfg content is needed true %end ########################################################################### %post --interpreter=/bin/bash HOOK_LABEL="post" . /tmp/lat/ks_functions.sh ilog "*************************************" ilog "*** Post - Set Kernel Args ***" ilog "*************************************" ########################################################### # From post_kernel_controller.cfg # From post_kernel_aio_worker.cfg ########################################################### . /etc/platform/platform.conf # Prepare the disk boot kernel comand line # ---------------------------------------- KERN_OPTS="${KERNEL_PARAMS}" ilog "Building up KERN_OPTS: ${KERN_OPTS}" function add_kernel_option() { option="${1}" ilog "... adding: ${option}" # avoid adding leading space on first option if [ "${KERN_OPTS}" = "" ] ; then KERN_OPTS="${option}" else KERN_OPTS="${KERN_OPTS} ${option}" fi } # If the installer asked us to use security related kernel params, use # them in the grub line as well (until they can be configured via puppet) security_feature="" # Handle security options # TODO: Create a list and loop over it security_options="nopti nospectre_v2 nospectre_v1" for o in ${security_options} do grep -q ${o} /proc/cmdline if [ $? -eq 0 ]; then add_kernel_option "${o}" if [ "${security_feature}" = "" ] ; then security_feature="${o}" else security_feature="${security_feature} ${o}" fi fi done [ "${KERN_OPTS}" != "" ] && ilog "Learned kernel params: ${KERN_OPTS}" ilog "Adding kernel options" if [ "${aio}" = true -o "${worker}" = true ] ; then if [ -e /etc/init.d/cpumap_functions.sh ] ; then # Update grub with custom kernel bootargs source /etc/init.d/cpumap_functions.sh n_cpus=$(cat /proc/cpuinfo 2>/dev/null | \ awk '/^[pP]rocessor/ { n +=1 } END { print (n>0) ? n : 1}') ilog "cpumap: n_cpus:${n_cpus}" n_numa=$(ls -d /sys/devices/system/node/node* 2>/dev/null | wc -l) ilog "cpumap: n_numa:${n_numa}" KERN_OPTS="${KERN_OPTS} iommu=pt" KERN_OPTS="${KERN_OPTS} hugepagesz=2M hugepages=0 default_hugepagesz=2M" # If this is an all-in-one system, we need at least 4 CPUs if [ "${aio}" = true -a ${n_cpus} -lt 4 ]; then report_failure_with_msg "At least 4 CPUs are required for ${SYSTEM_TYPE__AIO} node." fi # Add kernel options for cpu isolation / affinity if [ ${n_cpus} -gt 1 ] ; then base_cpulist=$(platform_expanded_cpu_list) ilog "cpumap: base_cpulist: ${base_cpulist}" base_cpumap=$(cpulist_to_cpumap ${base_cpulist} ${n_cpus}) ilog "cpumap: base_cpumap: ${base_cpumap}" avp_cpulist=$(vswitch_expanded_cpu_list) ilog "cpumap: avp_cpulist:${avp_cpulist}" if [ -e /etc/vswitch/vswitch.conf ] ; then # Update vswitch.conf sed -i "s/^VSWITCH_CPU_LIST=.*/VSWITCH_CPU_LIST=\"${avp_cpulist}\"/" /etc/vswitch/vswitch.conf else wlog "Missing /etc/vswitch/vswitch.conf ; update bypassed" fi norcu_cpumap=$(invert_cpumap ${base_cpumap} ${n_cpus}) ilog "cpumap: norcu_cpumap:${norcu_cpumap}" norcu_cpulist=$(cpumap_to_cpulist ${norcu_cpumap} ${n_cpus}) ilog "cpumap: norcu_cpulist:${norcu_cpulist}" if [ "${lowlatency}" = true ]; then KERN_OPTS="${KERN_OPTS} nohz_full=${norcu_cpulist}" fi KERN_OPTS="${KERN_OPTS} rcu_nocbs=${norcu_cpulist}" KERN_OPTS="${KERN_OPTS} kthread_cpus=${base_cpulist}" KERN_OPTS="${KERN_OPTS} irqaffinity=${norcu_cpulist}" fi else wlog "Missing /etc/init.d/cpumap_functions.sh ; cpumap setup bypassed" fi # Add kernel options to set NMI watchdog if [ "${lowlatency}" = true ] ; then add_kernel_option "nmi_watchdog=0 softlockup_panic=0" else add_kernel_option "nmi_watchdog=panic,1 softlockup_panic=1" fi if [[ "$(dmidecode -s system-product-name)" =~ ^ProLiant.*Gen8$ ]]; then add_kernel_option "intel_iommu=on,eth_no_rmrr" else add_kernel_option "intel_iommu=on" fi # Add kernel options to disable kvm-intel.eptad on Broadwell # Broadwell: Model: 79, Model name: Intel(R) Xeon(R) CPU E5-2699 v4 @ 2.20GHz if grep -q -E "^model\s+:\s+79$" /proc/cpuinfo then add_kernel_option "kvm-intel.eptad=0" fi # Add kernel option to avoid jiffies_lock contention on real-time kernel if [ "${lowlatency}" = true ] ; then add_kernel_option "skew_tick=1" fi elif [ "${controller}" = true ] ; then ilog "Adding ${TRAIT__CONTROLLER} function kernel options" ## Custom kernel options add_kernel_option "intel_iommu=off usbcore.autosuspend=-1" ## Setup the loop module to support up to 15 partitions so that we ## can enable the customer to manually resize images if needed. ## add_kernel_option "loop.max_part=15" # Add kernel options to ensure NMI watchdog is enabled, if supported add_kernel_option "nmi_watchdog=panic,1 softlockup_panic=1" elif [ "${storage}" = true ] ; then # We should never reach this code in miniboot: report_failure_with_msg "Unexpected: 'storage' type not supported in miniboot" fi ######################################################################################### # From post_kernel_aio_and_worker.cfg # From post_kernel_controller.cfg # From post_kernel_storage.cfg ######################################################################################### # Add kernel options to ensure an selinux is disabled for all node types add_kernel_option "selinux=0 enforcing=0" # Add kernel option to panic on a softdog timeout add_kernel_option "softdog.soft_panic=1" # Make sure that we are using cgroups v1 add_kernel_option "systemd.unified_cgroup_hierarchy=0" # k8s updates add_kernel_option "user_namespace.enable=1" # Add kernel option to disable biosdevname if enabled # As this may already be in GRUB_CMDLINE_LINUX, only add if it is not already present grep -q '^GRUB_CMDLINE_LINUX=.*biosdevname=0' /etc/default/grub if [ $? -ne 0 ]; then add_kernel_option "biosdevname=0" fi if [ ! -z "${insthwsettle}" ]; then if [[ ${insthwsettle} =~ ^[0-9]+$ ]]; then add_kernel_option "hwsettle=${insthwsettle}" fi fi if [ -n "${extra_boot_params}" ]; then # Strip out any commas and replace with space. extra_boot_params=${extra_boot_params//,/ } # replace all ',' with ' ' ilog "Adding extra_boot_params to kernel options: ${extra_boot_params}" add_kernel_option "${extra_boot_params}" fi # Search the install kernel command line for the multi-drivers-switch= # option and if present propagate that to the disk boot kernel options. CMDLINE=`cat /proc/cmdline` param="multi-drivers-switch" for option in ${CMDLINE} ; do opt=${option%%=*} if [ "${param}" = "${opt}" ]; then add_kernel_option "${option}" break fi done ######################################################################################## ilog "Adding these kernel params to disk boot: ${KERN_OPTS}" if [ -n "${KERN_OPTS}" ] ; then grep -q "^kernel_params=" /boot/efi/EFI/BOOT/boot.env if [ ${?} -ne 0 ]; then # Add line sed -i "1 a kernel_params=${KERN_OPTS}" /boot/efi/EFI/BOOT/boot.env else # Update existing sed -i "s/^kernel_params=.*/kernel_params=${KERN_OPTS}/" /boot/efi/EFI/BOOT/boot.env fi else wlog "no kernel options added" fi ilog "Override LAT grub file" GRUB_PATH_N_FILE="/boot/efi/EFI/BOOT/grub.cfg" if [ ! -e ${GRUB_PATH_N_FILE}.lat ] ; then mv ${GRUB_PATH_N_FILE} ${GRUB_PATH_N_FILE}.lat cp /var/pxeboot/pxelinux.cfg.files/grub.cfg.stx ${GRUB_PATH_N_FILE} fi ###################################################################### # From post_system_aio ###################################################################### TEMPLATE_FILE="/usr/share/worker-utils/config/worker_reserved.conf" TARGET_FILE="/etc/platform/worker_reserved.conf" if [ "${aio}" = true ] ; then ## Reserve more memory for base processes since the controller has higher ## memory requirements but cap it to better handle systems with large ## amounts of memory TOTALMEM=$(grep MemTotal /proc/meminfo | awk '{print int($2/1024)}') ilog "${SYSTEM_TYPE__AIO} MemTotal:${TOTALMEM}" if [ -e /sys/devices/system/node/node0 ]; then RESERVEDMEM=$(grep MemTotal /sys/devices/system/node/node0/meminfo | awk '{printf "%d\n", $4/1024}') else RESERVEDMEM=$(grep MemTotal /proc/meminfo | awk '{print int($2/1024/4)}') fi if [ ${RESERVEDMEM} -lt 6144 ]; then RESERVEDMEM=6144 elif [ ${RESERVEDMEM} -gt 14500 ]; then RESERVEDMEM=14500 elif [ ${RESERVEDMEM} -gt 8192 ]; then RESERVEDMEM=8192 fi # Normally we would set personality based files later # But we need to copy worker_reserved.conf now since it needs to be modified for AIO ilog "${SYSTEM_TYPE__AIO} Reserved Memory: ${RESERVEDMEM}" if [ ! -e "${TEMPLATE_FILE}" ] ; then report_failure_with_msg "Cannot configure worker cpu/memory ; missing ${TEMPLATE_FILE}" fi cp "${TEMPLATE_FILE}" "${TARGET_FILE}" if [ ! -e "${TARGET_FILE}" ] ; then report_failure_with_msg "Cannot configure worker cpu/memory ; missing ${TARGET_FILE}" fi sed -i -e "s#\(WORKER_BASE_RESERVED\)=.*#\1=(\"node0:${RESERVEDMEM}MB:1\" \"node1:2000MB:0\" \"node2:2000MB:0\" \"node3:2000MB:0\")#g" "${TARGET_FILE}" if [ $? -ne 0 ] ; then report_failure_with_msg "Cannot configure worker cpu/memory ; previous sed search and replace request failed" fi worker_reserved=$(grep WORKER_BASE_RESERVED "${TARGET_FILE}") ilog "${SYSTEM_TYPE__AIO} '${worker_reserved}'" # Update WORKER_CPU_LIST N_CPUS=$(cat /proc/cpuinfo 2>/dev/null | awk '/^[pP]rocessor/ { n +=1 } END { print (n>0) ? n : 1}') sed -i "s/^WORKER_CPU_LIST=.*/WORKER_CPU_LIST=\"0-$((N_CPUS-1))\"/" "${TARGET_FILE}" worker_cpu_list=$(grep WORKER_CPU_LIST "${TARGET_FILE}") ilog "${SYSTEM_TYPE__AIO} '${worker_cpu_list}'" elif [ "${worker}" = true ] ; then # Keep logic contained and copy worker_reserved.conf now since we need # to do the copy for AIO above ilog "Enable ${TARGET_FILE} for ${TRAIT__WORKER}" if [ ! -e "${TEMPLATE_FILE}" ] ; then report_failure_with_msg "Cannot configure worker cpu/memory ; missing ${TEMPLATE_FILE}" fi cp "${TEMPLATE_FILE}" "${TARGET_FILE}" if [ ! -e "${TARGET_FILE}" ] ; then report_failure_with_msg "Cannot configure worker cpu/memory ; missing ${TARGET_FILE}" fi fi true %end ########################################################################### %post --interpreter=/bin/bash --nochroot HOOK_LABEL="post_nochroot" . /tmp/lat/ks_functions.sh ilog "************************************" ilog "*** Post - Interface Setup ***" ilog "************************************" ilog "Creating network definitions in /etc/network/interfaces.d" parse_miniboot_network_params mgmt_dev=${BOOTPARAM_IFNAME} mgmt_vlan=${BOOTPARAM_VLAN} mgmt_address_family=${BOOTPARAM_MGMT_ADDRESS_FAMILY} ilog "mgmt_dev : ${mgmt_dev}" ilog "mgmt_vlan: ${mgmt_vlan}" if [ ! -e "${IMAGE_ROOTFS}/etc/network/interfaces" ] ; then cat << EOF >> ${IMAGE_ROOTFS}/etc/network/interfaces # This file describes the network interfaces available on the system # and how to activate them. For more information , see interfaces(5) source ${IMAGE_ROOTFS}/etc/network/interfaces.d/* EOF fi if [ ! -d "${IMAGE_ROOTFS}/etc/network/interfaces.d" ] ; then mkdir -p -m 0775 ${IMAGE_ROOTFS}/etc/network/interfaces.d fi ilog "Setup network scripts" function create_network_interface_file() { local ifname=${1} local address_family=${2} local vlan=${3:-} local ipversion=ipv4 local ip_cmd_flag="-4" if [ "${address_family}" == "inet6" ]; then local ipversion=ipv6 local ip_cmd_flag="-6" fi local ifname_vlan="vlan${vlan}" local logstr="Creating ${IMAGE_ROOTFS}/etc/network/interfaces.d/ifcfg-${ifname}, ${ipversion}" [ -n "${vlan}" ] && logstr="${logstr}, vlan interface: ${ifname_vlan}" [ -n "${BOOTPARAM_GW}" ] && logstr="${logstr}, gw: ${BOOTPARAM_GW}" ilog "${logstr}" local output if [ -z "${vlan}" ]; then # Persist the boot device to the platform configuration # overwritten later if the management_interface is on a bonded interface. update_platform_conf "management_interface=${ifname}" # NO VLAN output="auto ${ifname}\n" output="${output}iface ${ifname} ${address_family} static\n" output="${output} address ${BOOTPARAM_IP_ADDR}/$BOOTPARAM_PREFIX_LEN\n" if [ -n "${BOOTPARAM_GW}" ]; then output="${output} gateway $BOOTPARAM_GW\n" fi output="${output} mtu 1500\n" output="${output} post-up echo 0 > /proc/sys/net/ipv6/conf/${ifname}/autoconf\n" output="${output} post-up echo 0 > /proc/sys/net/ipv6/conf/${ifname}/accept_ra\n" output="${output} post-up echo 0 > /proc/sys/net/ipv6/conf/${ifname}/accept_redirects\n" echo -e "${output}" > "${IMAGE_ROOTFS}/etc/network/interfaces.d/ifcfg-${ifname}" else # CONFIGURE FOR VLAN # Persist the boot device to the platform configuration. This will get # overwritten later if the management_interface is on a bonded interface. update_platform_conf "management_interface=${ifname_vlan}" # 1. Configure device interface: output="auto ${ifname}\n" output="${output}iface ${ifname} ${address_family} manual\n" output="${output} post-up echo 0 > /proc/sys/net/ipv6/conf/${ifname}/autoconf\n" output="${output} post-up echo 0 > /proc/sys/net/ipv6/conf/${ifname}/accept_ra\n" output="${output} post-up echo 0 > /proc/sys/net/ipv6/conf/${ifname}/accept_redirects\n" echo -e "${output}" > "${IMAGE_ROOTFS}/etc/network/interfaces.d/ifcfg-${ifname}" # 2. Configure VLAN interface: output="auto ${ifname_vlan}\n" output="${output}iface ${ifname_vlan} ${address_family} static\n" output="${output} vlan-raw-device ${ifname}\n" output="${output} address ${BOOTPARAM_IP_ADDR}/${BOOTPARAM_PREFIX_LEN}\n" if [ -n "${BOOTPARAM_GW}" ]; then output="${output} gateway ${BOOTPARAM_GW}\n" fi output="${output} mtu 1500\n" output="${output} post-up echo 0 > /proc/sys/net/ipv6/conf/${ifname_vlan}/autoconf\n" output="${output} post-up echo 0 > /proc/sys/net/ipv6/conf/${ifname_vlan}/accept_ra\n" output="${output} post-up echo 0 > /proc/sys/net/ipv6/conf/${ifname_vlan}/accept_redirects\n" echo -e "${output}" > "${IMAGE_ROOTFS}/etc/network/interfaces.d/ifcfg-${ifname_vlan}" fi } # Build networking scripts # Loopback file lo_file="${IMAGE_ROOTFS}/etc/network/interfaces.d/ifcfg-lo" echo "auto lo" > "${lo_file}" echo "iface lo ${mgmt_address_family} loopback" >> "${lo_file}" if [ "${mgmt_dev}" != "lo" ]; then create_network_interface_file "${mgmt_dev}" "${mgmt_address_family}" "${mgmt_vlan}" fi ilog "Contents of ${IMAGE_ROOTFS}/etc/network/interfaces.d/ifcfg-lo:" ilog "$(cat "${IMAGE_ROOTFS}/etc/network/interfaces.d/ifcfg-lo")" ilog "Contents of ${IMAGE_ROOTFS}/etc/network/interfaces.d/ifcfg-${mgmt_dev}:" ilog "$(cat "${IMAGE_ROOTFS}/etc/network/interfaces.d/ifcfg-${mgmt_dev}")" if [ -f "${IMAGE_ROOTFS}/etc/network/interfaces.d/ifcfg-vlan${mgmt_vlan}" ]; then ilog "Contents of ${IMAGE_ROOTFS}/etc/network/interfaces.d/ifcfg-vlan${mgmt_vlan}:" ilog "$(cat "${IMAGE_ROOTFS}/etc/network/interfaces.d/ifcfg-vlan${mgmt_vlan}")" fi # Clean machine-id file, it needs to be generated after install. # It must be unique per installation because it is used to generate # random MACs for SR-IOV VFs, among other resources. find / -name machine-id | xargs rm -fv true %end ########################################################################## %post --interpreter=/bin/bash --nochroot HOOK_LABEL="post_nochroot" . /tmp/lat/ks_functions.sh ilog "*********************************************************" ilog "*** Post Nochroot - Kickstart Finalize Install UUID ***" ilog "*********************************************************" # Create a uuid specific to this installation # install_uuid under /var needs to match what is written to /etc/platform/platform.conf # When instflux=0 (/var not on a dedicated fluxdata partition) # When instflux=1 (/var is part of the two different sysroot deployments). # Therefore check if the file has been written and use that, otherwise generate it feed="${IMAGE_ROOTFS}/var/www/pages/feed/rel-xxxPLATFORM_RELEASExxx" [ ! -d "${feed}" ] && mkdir -p -m 0755 ${feed} $(is_system_node_install) if [ $? -ne 0 ] ; then if [ -e "${LAT_DIR}/INSTALL_UUID" ]; then INSTALL_UUID=$(< "${LAT_DIR}/INSTALL_UUID") ilog "Using saved install uuid ${INSTALL_UUID}" else INSTALL_UUID=`uuidgen` ilog "Generated install uuid ${INSTALL_UUID}" echo "${INSTALL_UUID}" > ${LAT_DIR}/INSTALL_UUID fi ilog "... adding to ${feed}" echo ${INSTALL_UUID} > ${feed}/install_uuid ilog "... adding to ${PLATFORM_CONF}" update_platform_conf "INSTALL_UUID=${INSTALL_UUID}" else # miniboot: this code should never be hit report_failure_with_msg "Unexpected: incorrect node during UUID creation" fi true %end ########################################################################## %post --interpreter=/bin/bash HOOK_LABEL="post" . /tmp/lat/ks_functions.sh ilog "****************************************" ilog "*** Post - Log Filesystem Setup ***" ilog "****************************************" display_volume_info "final" true %end ########################################################################## %post --interpreter=/bin/bash --nochroot HOOK_LABEL="post_nochroot" . /tmp/lat/ks_functions.sh ilog "***********************************************************" ilog "*** Post Nochroot - Restage OSTree repo ***" ilog "*** - Save Install Scripts and Logs ***" ilog "***********************************************************" ilog "IMAGE_ROOTFS=${IMAGE_ROOTFS}" get_variable "ostree_repo_fetched" OSTREE_REPO_FETCHED=$? # Fetch ostree if [ "${controller}" = true ] ; then sw_release="xxxPLATFORM_RELEASExxx" # updated by the build feed="${IMAGE_ROOTFS}/var/www/pages/feed/rel-${sw_release}" repo="${feed}/ostree_repo" pxedir="${IMAGE_ROOTFS}/var/pxeboot" if [ ${OSTREE_REPO_FETCHED} -eq 0 ] ; then if is_usb_install -eq 0 ; then # miniboot: always false report_failure_with_msg "Unexpected miniboot code block: usb install" else ilog "Stage ostree_repo from previous /sysroot pull to ${repo}" mv -f /sysroot/var/www/pages/feed/rel-${sw_release}/ostree_repo ${IMAGE_ROOTFS}/var/www/pages/feed/rel-${sw_release}/ fi # This is used by patching. # Set ostree remote to the local install feed file_feed="file:///var/www/pages/feed/rel-${sw_release}/ostree_repo/" feed_branch="starlingx" ilog "Replacing ostree sysroot remote with: ${file_feed} ${feed_branch}" ostree --repo=/sysroot/ostree/repo remote delete ${instname} ostree --repo=/sysroot/ostree/repo remote add ${instname} ${file_feed} ${feed_branch} # Set feed ostree remote "starlingx" to point to active controller's feed ostree repo feed_remote_name="starlingx" feed_remote_url="http://controller:8080/feed/rel-${sw_release}/ostree_repo/" ilog "Replacing ostree feed remote with: ${feed_remote_url} ${feed_remote_name}" ostree --repo=${repo} remote delete ${feed_remote_name} ostree --repo=${repo} remote add ${feed_remote_name} ${feed_remote_url} ${feed_branch} # This fetch is only needed once because the repo is stored in /var set_variable "ostree_repo_fetched" # If the miniboot ISO contains a patches directory if [ -d "/instboot/patches" ]; then ilog "Prepatched iso" ilog "Creating patching metadata directories" mkdir -p ${IMAGE_ROOTFS}/var/rootdirs/opt/patching/metadata/{committed,available,applied} cp -a /instboot/patches/* ${IMAGE_ROOTFS}/var/rootdirs/opt/patching/metadata/committed/ fi # copy efi.img to /var/pxeboot to enable duplex/multinode subclouds cp -a /instboot/efi.img ${pxedir} rc=$? if [ ${rc} -ne 0 ]; then elog "Failed to copy efi.img to ${pxedir}" fi # Temporary WorkAround: The current UEFI pxeboot loader does not call the # default provisioning grub menu in /var/pxeboot/pxelinux.cfg/grub.cfg. # # While the above issue is investigated, to support DX and system node # install for UEFI servers this code moves the lat grub.cfg aside and # creates a link to the default provisioning mac based grub menu. if [ ! -e ${pxedir}/EFI/BOOT ]; then mkdir -p ${pxedir}/EFI/BOOT fi pushd ${pxedir}/EFI/BOOT > /dev/null if [ ! -L grub.cfg ] ; then if [ -e grub.cfg ] ; then mv grub.cfg grub.cfg.lat fi ln -s ../../pxelinux.cfg/grub.cfg fi popd > /dev/null fi fi # Save the install scripts and kickstart logs mount /dev/mapper/cgts--vg-log--lv "${IMAGE_ROOTFS}/${LOG_DIR}" if [ ${?} -ne 0 ] ; then elog "Failed to mount /dev/mapper/cgts--vg-log--lv" else if [ -e "${IMAGE_ROOTFS}/${LOG_DIR}" ]; then cp -a /${LAT_DIR} ${IMAGE_ROOTFS}/${LOG_DIR} cp /install ${IMAGE_ROOTFS}/${LOG_DIR}/lat cp /lat-installer* ${IMAGE_ROOTFS}/${LOG_DIR}/lat ilog "Saved installer data to ${IMAGE_ROOTFS}/${LOG_DIR}" else wlog "Could not save installer data" fi umount "${IMAGE_ROOTFS}/${LOG_DIR}" fi true %end ########################################################################## %post --interpreter=/bin/bash --nochroot HOOK_LABEL="post_nochroot" . /tmp/lat/ks_functions.sh # This section needs to be removed when solutions are implemented ilog "******************************************************************" ilog "*** Post Nochroot - Workarounds for enabling integration ***" ilog "******************************************************************" # Workaround for enabling swacts on AIO-DX # Workaround for enabling compute unlocks # Launchpad: #1983580 [ -f ${IMAGE_ROOTFS}/var/lib/dpkg/triggers/Unincorp ] && rm ${IMAGE_ROOTFS}/var/lib/dpkg/triggers/Unincorp true %end ########################################################################## %post --interpreter=/bin/bash --nochroot HOOK_LABEL="post_nochroot" . /tmp/lat/ks_functions.sh # This needs to update all available ostree based rootfs ilog "******************************************************" ilog "*** Post Nochroot - Set up filesystem access ***" ilog "******************************************************" if [ "${controller}" = true ] ; then mkdir -p ${IMAGE_ROOTFS}/var/rootdirs/opt/platform-backup echo -e "LABEL=platform_backup\t/var/rootdirs/opt/platform-backup\text4\tdefaults\t1 2" >> ${IMAGE_ROOTFS}/etc/fstab elif [ "${worker}" = true ] ; then mkdir -p ${IMAGE_ROOTFS}/var/rootdirs/opt/platform echo -e "controller-platform-nfs:/opt/platform\t/opt/platform\tnfs\ttimeo=30,udp,rsize=1024,wsize=1024,_netdev 0 0" >> ${IMAGE_ROOTFS}/etc/fstab fi mkdir -p ${IMAGE_ROOTFS}/var/rootdirs/scratch echo -e "/dev/mapper/cgts--vg-scratch--lv\t/var/rootdirs/scratch\text4\tdefaults\t1 2" >> ${IMAGE_ROOTFS}/etc/fstab mkdir -p ${IMAGE_ROOTFS}/var/log echo -e "/dev/mapper/cgts--vg-log--lv\t/var/log\text4\tdefaults\t1 2" >> ${IMAGE_ROOTFS}/etc/fstab # Report and update the lvm config for the sysroot. Remove preceeding tab and # convert to spaces to align with puppet expectations LV_PERSISTENT_ROOTDISK=$(get_persistent_disk ${LV_ROOTDISK}) log_lvm_conf "SysRoot Initial" ${IMAGE_ROOTFS}/etc/lvm/lvm.conf ilog "" ilog "Update the LVM global filter to enable the initial physical volume only: ${LV_PERSISTENT_ROOTDISK}" ilog "" sed -i "s@^\(\s*\)# global_filter = \[.*@ global_filter = [ \"a|${LV_PERSISTENT_ROOTDISK}|\", \"r|.*|\" ]@" ${IMAGE_ROOTFS}/etc/lvm/lvm.conf log_lvm_conf "SysRoot Updated" ${IMAGE_ROOTFS}/etc/lvm/lvm.conf eject_device=$(eject -d | awk -F\` '{print $2}' | awk -F\' '{print $1}') ilog "eject device=$eject_device" eject $eject_device rc=$? [ $rc -ne 0 ] && elog "eject failed, rc=$rc" # Create first_boot flag touch ${IMAGE_ROOTFS}/etc/platform/.first_boot true %end ########################################################################## %post --interpreter=/bin/bash --nochroot HOOK_LABEL="post_nochroot" . /tmp/lat/ks_functions.sh # This needs to update all available ostree based rootfs ilog "****************************************************************" ilog "*** Post Nochroot - Set up package links per node type ***" ilog "****************************************************************" ilog "IMAGE_ROOTFS=${IMAGE_ROOTFS}" if [ ! -d "${IMAGE_ROOTFS}/etc/goenabled.d" ]; then wlog "Directory ${IMAGE_ROOTFS}/etc/goenabled.d is missing, creating it now" mkdir ${IMAGE_ROOTFS}/etc/goenabled.d fi if [ ! "${controller}" = true -a "${worker}" = true ] ; then ilog "Setting up ${TRAIT__WORKER} package file links" ln -s /etc/goenabled.d/config_goenabled_check.sh.worker ${IMAGE_ROOTFS}/etc/goenabled.d/config_goenabled_check.sh ln -s /dev/null ${IMAGE_ROOTFS}/etc/systemd/system/controllerconfig.service ln -s /dev/null ${IMAGE_ROOTFS}/etc/systemd/system/storageconfig.service elif [ "${storage}" = true ] ; then ilog "Setting up ${TRAIT__STORAGE} package file links" ln -s /etc/goenabled.d/config_goenabled_check.sh.storage ${IMAGE_ROOTFS}/etc/goenabled.d/config_goenabled_check.sh ln -s /dev/null ${IMAGE_ROOTFS}/etc/systemd/system/controllerconfig.service ln -s /dev/null ${IMAGE_ROOTFS}/etc/systemd/system/workerconfig.service elif [ "${controller}" = true ] ; then ilog "Setting up ${TRAIT__CONTROLLER} package file links" ln -s /etc/goenabled.d/config_goenabled_check.sh.controller ${IMAGE_ROOTFS}/etc/goenabled.d/config_goenabled_check.sh ln -s /dev/null ${IMAGE_ROOTFS}/etc/systemd/system/workerconfig.service ln -s /dev/null ${IMAGE_ROOTFS}/etc/systemd/system/storageconfig.service fi chmod 700 ${IMAGE_ROOTFS}/etc/goenabled.d/config_goenabled_check.sh if [[ ! -d "${IMAGE_ROOTFS}/etc/pmon.d" ]]; then wlog "Directory ${IMAGE_ROOTFS}/etc/pmon.d/ is missing, creating it now" mkdir ${IMAGE_ROOTFS}/etc/pmon.d fi if [ "${controller}" = true ] ; then ilog "Setting up pmon files for ${TRAIT__CONTROLLER} and/or ${TRAIT__CONTROLLER} side of ${SYSTEM_TYPE__AIO}" ln -s /usr/share/starlingx/pmon.d/acpid.conf ${IMAGE_ROOTFS}/etc/pmon.d/acpid.conf ln -s /usr/share/starlingx/pmon.d/containerd.conf ${IMAGE_ROOTFS}/etc/pmon.d/containerd.conf ln -s /usr/share/starlingx/pmon.d/docker.conf ${IMAGE_ROOTFS}/etc/pmon.d/docker.conf ln -s /usr/share/starlingx/pmon.d/fm-api.conf ${IMAGE_ROOTFS}/etc/pmon.d/fm-api.conf ln -s /usr/share/starlingx/pmon.d/fsmon.conf ${IMAGE_ROOTFS}/etc/pmon.d/fsmon.conf ln -s /usr/share/starlingx/pmon.d/hbsAgent.conf ${IMAGE_ROOTFS}/etc/pmon.d/hbsAgent.conf ln -s /usr/share/starlingx/pmon.d/hbsClient.conf ${IMAGE_ROOTFS}/etc/pmon.d/hbsClient.conf ln -s /usr/share/starlingx/pmon.d/lmon.conf ${IMAGE_ROOTFS}/etc/pmon.d/lmon.conf ln -s /usr/share/starlingx/pmon.d/logmgmt ${IMAGE_ROOTFS}/etc/pmon.d/logmgmt ln -s /usr/share/starlingx/pmon.d/mtcClient.conf ${IMAGE_ROOTFS}/etc/pmon.d/mtcClient.conf ln -s /usr/share/starlingx/pmon.d/mtcalarm.conf ${IMAGE_ROOTFS}/etc/pmon.d/mtcalarm.conf ln -s /usr/share/starlingx/pmon.d/mtclogd.conf ${IMAGE_ROOTFS}/etc/pmon.d/mtclogd.conf ln -s /usr/share/starlingx/pmon.d/sm-api.conf ${IMAGE_ROOTFS}/etc/pmon.d/sm-api.conf ln -s /usr/share/starlingx/pmon.d/sm-eru.conf ${IMAGE_ROOTFS}/etc/pmon.d/sm-eru.conf ln -s /usr/share/starlingx/pmon.d/sm.conf ${IMAGE_ROOTFS}/etc/pmon.d/sm.conf ln -s /usr/share/starlingx/pmon.d/sshd.conf ${IMAGE_ROOTFS}/etc/pmon.d/sshd.conf ln -s /usr/share/starlingx/pmon.d/sssd.conf ${IMAGE_ROOTFS}/etc/pmon.d/sssd.conf ln -s /usr/share/starlingx/pmon.d/sw-patch-agent.conf ${IMAGE_ROOTFS}/etc/pmon.d/sw-patch-agent.conf ln -s /usr/share/starlingx/pmon.d/sw-patch-controller-daemon.conf ${IMAGE_ROOTFS}/etc/pmon.d/sw-patch-controller-daemon.conf ln -s /usr/share/starlingx/pmon.d/sysinv-agent.conf ${IMAGE_ROOTFS}/etc/pmon.d/sysinv-agent.conf ln -s /usr/share/starlingx/pmon.d/syslog-ng.conf ${IMAGE_ROOTFS}/etc/pmon.d/syslog-ng.conf ln -s /usr/share/starlingx/pmon.d/luks.conf ${IMAGE_ROOTFS}/etc/pmon.d/luks.conf ln -s /usr/share/starlingx/pmon.d/ipsec-server.conf ${IMAGE_ROOTFS}/etc/pmon.d/ipsec-server.conf fi if [ "${worker}" = true ] ; then ilog "Setting up pmon files for ${TRAIT__WORKER} and/or ${TRAIT__WORKER} side of ${SYSTEM_TYPE__AIO}" ln -s /usr/share/starlingx/pmon.d/acpid.conf ${IMAGE_ROOTFS}/etc/pmon.d/acpid.conf ln -s /usr/share/starlingx/pmon.d/containerd.conf ${IMAGE_ROOTFS}/etc/pmon.d/containerd.conf ln -s /usr/share/starlingx/pmon.d/docker.conf ${IMAGE_ROOTFS}/etc/pmon.d/docker.conf ln -s /usr/share/starlingx/pmon.d/fsmon.conf ${IMAGE_ROOTFS}/etc/pmon.d/fsmon.conf ln -s /usr/share/starlingx/pmon.d/hbsClient.conf ${IMAGE_ROOTFS}/etc/pmon.d/hbsClient.conf ln -s /usr/share/starlingx/pmon.d/isolcpu_plugin.conf ${IMAGE_ROOTFS}/etc/pmon.d/isolcpu_plugin.conf ln -s /usr/share/starlingx/pmon.d/lmon.conf ${IMAGE_ROOTFS}/etc/pmon.d/lmon.conf ln -s /usr/share/starlingx/pmon.d/logmgmt ${IMAGE_ROOTFS}/etc/pmon.d/logmgmt ln -s /usr/share/starlingx/pmon.d/mtcClient.conf ${IMAGE_ROOTFS}/etc/pmon.d/mtcClient.conf ln -s /usr/share/starlingx/pmon.d/mtcalarm.conf ${IMAGE_ROOTFS}/etc/pmon.d/mtcalarm.conf ln -s /usr/share/starlingx/pmon.d/mtclogd.conf ${IMAGE_ROOTFS}/etc/pmon.d/mtclogd.conf ln -s /usr/share/starlingx/pmon.d/sm-eru.conf ${IMAGE_ROOTFS}/etc/pmon.d/sm-eru.conf ln -s /usr/share/starlingx/pmon.d/sshd.conf ${IMAGE_ROOTFS}/etc/pmon.d/sshd.conf ln -s /usr/share/starlingx/pmon.d/sssd.conf ${IMAGE_ROOTFS}/etc/pmon.d/sssd.conf ln -s /usr/share/starlingx/pmon.d/sw-patch-agent.conf ${IMAGE_ROOTFS}/etc/pmon.d/sw-patch-agent.conf ln -s /usr/share/starlingx/pmon.d/sysinv-agent.conf ${IMAGE_ROOTFS}/etc/pmon.d/sysinv-agent.conf ln -s /usr/share/starlingx/pmon.d/syslog-ng.conf ${IMAGE_ROOTFS}/etc/pmon.d/syslog-ng.conf fi if [ "${storage}" = true ] ; then ilog "Setting up pmon files for ${TRAIT__STORAGE} and/or ${TRAIT__STORAGE} side of ${SYSTEM_TYPE__AIO}" ln -s /usr/share/starlingx/pmon.d/acpid.conf ${IMAGE_ROOTFS}/etc/pmon.d/acpid.conf ln -s /usr/share/starlingx/pmon.d/containerd.conf ${IMAGE_ROOTFS}/etc/pmon.d/containerd.conf ln -s /usr/share/starlingx/pmon.d/docker.conf ${IMAGE_ROOTFS}/etc/pmon.d/docker.conf ln -s /usr/share/starlingx/pmon.d/fsmon.conf ${IMAGE_ROOTFS}/etc/pmon.d/fsmon.conf ln -s /usr/share/starlingx/pmon.d/hbsClient.conf ${IMAGE_ROOTFS}/etc/pmon.d/hbsClient.conf ln -s /usr/share/starlingx/pmon.d/lmon.conf ${IMAGE_ROOTFS}/etc/pmon.d/lmon.conf ln -s /usr/share/starlingx/pmon.d/logmgmt ${IMAGE_ROOTFS}/etc/pmon.d/logmgmt ln -s /usr/share/starlingx/pmon.d/mtcClient.conf ${IMAGE_ROOTFS}/etc/pmon.d/mtcClient.conf ln -s /usr/share/starlingx/pmon.d/mtcalarm.conf ${IMAGE_ROOTFS}/etc/pmon.d/mtcalarm.conf ln -s /usr/share/starlingx/pmon.d/mtclogd.conf ${IMAGE_ROOTFS}/etc/pmon.d/mtclogd.conf ln -s /usr/share/starlingx/pmon.d/sm-eru.conf ${IMAGE_ROOTFS}/etc/pmon.d/sm-eru.conf ln -s /usr/share/starlingx/pmon.d/sshd.conf ${IMAGE_ROOTFS}/etc/pmon.d/sshd.conf ln -s /usr/share/starlingx/pmon.d/sssd.conf ${IMAGE_ROOTFS}/etc/pmon.d/sssd.conf ln -s /usr/share/starlingx/pmon.d/sw-patch-agent.conf ${IMAGE_ROOTFS}/etc/pmon.d/sw-patch-agent.conf ln -s /usr/share/starlingx/pmon.d/sysinv-agent.conf ${IMAGE_ROOTFS}/etc/pmon.d/sysinv-agent.conf ln -s /usr/share/starlingx/pmon.d/syslog-ng.conf ${IMAGE_ROOTFS}/etc/pmon.d/syslog-ng.conf fi true %end # vim: filetype=sh