Bug 1812299 - Fail NBDE procedure, if the disk partition containing the root filesystem is not encrypted
Summary: Fail NBDE procedure, if the disk partition containing the root filesystem is ...
Alias: None
Product: Red Hat Gluster Storage
Classification: Red Hat
Component: gluster-ansible
Version: rhgs-3.5
Hardware: x86_64
OS: Linux
Target Milestone: ---
: RHGS 3.5.z Batch Update 2
Assignee: Gobinda Das
Depends On:
Blocks: 1812298
TreeView+ depends on / blocked
Reported: 2020-03-11 00:26 UTC by SATHEESARAN
Modified: 2020-06-16 05:57 UTC (History)
5 users (show)

Fixed In Version: gluster-ansible-infra-1.0.4-6.el8rhgs
Doc Type: No Doc Update
Doc Text:
Clone Of: 1812298
rhhiv, rhel8
Last Closed: 2020-06-16 05:57:29 UTC
Target Upstream Version:

Attachments (Terms of Use)

System ID Private Priority Status Summary Last Updated
Github gluster gluster-ansible-infra pull 82 0 None closed NBDE and blacklist issue fixes 2020-07-09 11:17:16 UTC
Github gluster gluster-ansible pull 97 0 None closed Validate if root device is encrypted prior to actual configuration 2020-07-09 11:17:18 UTC
Red Hat Product Errata RHEA-2020:2575 0 None None None 2020-06-16 05:57:52 UTC

Description SATHEESARAN 2020-03-11 00:26:56 UTC
Description of problem:
Its a prerequisite to have the root filesystem encrypted ( disk partition containing the root filesystem to be encrypted ). But in some non-regular workflows, customers may try to run the procedure without having the root filesystem encrypted. In those cases, the ansible playbook should care to check whether the root filesystem is encrypted.

Version-Release number of selected component (if applicable):

How reproducible:

Steps to Reproduce:
1. Install RHVH 4.4 without encrypting the root filesystem disk
2. Complete the installation and reboot
3. Run the playbook to setup NBDE for root filesystem disk and other additional disks

Actual results:
No check was made, it fails when binding to tang server

Expected results:
Precheck should be made well before doing any steps for NBDE

Additional info:
The following command is useful to know whether the partition is encrypted
# cryptsetup isLuks <root-filesystem-disk> 

In this case, 
/dev/sda2 is encrypted.
/dev/sdb is not encrypted

[root@ ]# cryptsetup isLuks /dev/sda2
[root@ ]# echo $?
[root@ ]# cryptsetup isLuks /dev/sdb
[root@ ]# echo $?

non-zero value is returned, if its not an encrypted disk

Comment 3 SATHEESARAN 2020-03-21 11:00:32 UTC
Verified with gluster-ansible-infra-1.0.4-6

Precheck is done to make sure that the root disk with root filesystem is LUKS encrypted

Comment 7 errata-xmlrpc 2020-06-16 05:57:29 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.


Note You need to log in before you can comment on or make changes to this bug.