Bug 2159440
Summary: | clevis_devices_to_unlock() doesn't skip comments, causing clevis-luks-askpass.service to always run | |||
---|---|---|---|---|
Product: | Red Hat Enterprise Linux 8 | Reporter: | Renaud Métrich <rmetrich> | |
Component: | clevis | Assignee: | Sergio Arroutbi <sarroutb> | |
Status: | CLOSED ERRATA | QA Contact: | Martin Zelený <mzeleny> | |
Severity: | medium | Docs Contact: | Jan Fiala <jafiala> | |
Priority: | medium | |||
Version: | 8.7 | CC: | dapospis, jafiala, mzeleny, sarroutb | |
Target Milestone: | rc | Keywords: | Triaged | |
Target Release: | --- | Flags: | pm-rhel:
mirror+
|
|
Hardware: | All | |||
OS: | Linux | |||
Whiteboard: | ||||
Fixed In Version: | clevis-15-12.el8 | Doc Type: | Bug Fix | |
Doc Text: |
.Clevis ignores commented devices in `crypttab`
Previously, Clevis tried to unlock commented devices in the `crypttab` file, causing the `clevis-luks-askpass` service to run even if the device was not valid. This caused unnecessary service runs and made it difficult to troubleshoot.
With this fix, Clevis ignores commented devices. Now, if an invalid device is commented, Clevis does not attempt to unlock it and `clevis-luks-askpass.service` finishes appropriately. This makes it easier to troubleshoot and reduces unnecessary service runs.
|
Story Points: | --- | |
Clone Of: | ||||
: | 2159728 (view as bug list) | Environment: | ||
Last Closed: | 2023-05-16 08:39:14 UTC | Type: | Bug | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | ||||
Bug Blocks: | 2159728 |
Description
Renaud Métrich
2023-01-09 15:33:15 UTC
@jafiala : Changes in doc text LGTM. Thanks Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (clevis bug fix and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2023:2868 |