Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Rename cryptlvm+activate_existing* to activate_encrypted_volume #11716

Merged
merged 1 commit into from Jan 11, 2021
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
4 changes: 2 additions & 2 deletions lib/validate_encrypt_utils.pm
Expand Up @@ -37,7 +37,7 @@ our @EXPORT = qw(
verify_cryptsetup_properties
verify_restoring_luks_backups
verify_locked_encrypted_partition
validate_activation_encrypted_partition
validate_encrypted_volume_activation
);

=head2 parse_devices_in_crypttab
Expand Down Expand Up @@ -231,7 +231,7 @@ sub verify_locked_encrypted_partition {
record_info('lock OK', "Encrypted partition '/dev/$enc_disk_part' still locked");
}

sub validate_activation_encrypted_partition {
sub validate_encrypted_volume_activation {
my ($args) = @_;
select_console 'install-shell';
my $status = parse_cryptsetup_status($args->{mapped_device});
Expand Down
@@ -1,5 +1,5 @@
---
name: autoyast_cryptlvm+activate_existing
name: autoyast_activate_encrypted_volume
description: >
Conduct autoyast installation activating encrypted partitions
vars:
Expand Down
Expand Up @@ -3,7 +3,7 @@ description: >
Conduct installation activating encrypted partitions, but creating encrypted
lvm setup from scratch. Using pre-partitioned disk image to validate encrypted
partitions activation and that we can re-ecnrypt the disk.
name: cryptlvm+activate_existing+force_recompute
name: activate_encrypted_volume+force_recompute
vars:
ENCRYPT: 1
ENCRYPT_ACTIVATE_EXISTING: 1
Expand Down
Expand Up @@ -5,7 +5,7 @@ description: >
partitions activation and that we can re-ecnrypt the disk.
For powerVM we have to disable plymouth, so edit_optional_kernel_cmd_parameters
module is scheduled and OPT_KERNEL_PARAMS variable is set.
name: cryptlvm+activate_existing+force_recompute
name: activate_encrypted_volume+force_recompute
vars:
ENCRYPT: 1
ENCRYPT_ACTIVATE_EXISTING: 1
Expand Down
Expand Up @@ -3,7 +3,7 @@ description: >
Conduct installation activating encrypted partitions and importing users created
in that installation. Using pre-partitioned disk image to validate encrypted
partitions activation and that we can re-ecnrypt the disk.
name: cryptlvm+activate_existing+import_users
name: activate_encrypted_volume+import_users
vars:
ENCRYPT_ACTIVATE_EXISTING: 1
schedule:
Expand All @@ -28,5 +28,4 @@ schedule:
- installation/logs_from_installation_system
- installation/reboot_after_installation
- installation/grub_test
- installation/boot_encrypt
- installation/first_boot
Expand Up @@ -5,7 +5,7 @@ description: >
partitions activation and that we can re-ecnrypt the disk.
Separate schedule is used because on powerVM we simulate existing users on the
encrypted partition by injecting /etc/passwd and /etc/shadow files.
name: cryptlvm+activate_existing+import_users
name: activate_encrypted_volume+import_users
vars:
ENCRYPT_ACTIVATE_EXISTING: 1
ETC_PASSWD: "bernhard:x:1000:100:bernhard:/home/bernhard:/bin/bash"
Expand All @@ -32,6 +32,5 @@ schedule:
- installation/reboot_after_installation
- boot/reconnect_mgmt_console
- installation/grub_test
- installation/boot_encrypt
- installation/first_boot
- console/validate_user_login_textmode
Expand Up @@ -2,7 +2,7 @@
description: >
Conduct installation trying to reuse encrypted partitions (bsc#993247). Using
pre-partitioned disk image to validate encrypted partitions activation.
name: cryptlvm+activate_existing
name: activate_encrypted_volume
vars:
ENCRYPT_ACTIVATE_EXISTING: 1
schedule:
Expand All @@ -11,7 +11,7 @@ schedule:
- installation/accept_license
- installation/scc_registration
- installation/encrypted_volume_activation
- console/validate_activation_encrypted_partition
- console/validate_encrypted_volume_activation
- installation/addon_products_sle
- installation/system_role
- installation/partitioning
Expand All @@ -28,7 +28,6 @@ schedule:
- installation/logs_from_installation_system
- installation/reboot_after_installation
- installation/grub_test
- installation/boot_encrypt
- installation/first_boot
test_data:
<<: !include test_data/yast/encryption/cryptlvm+activate_existing.yaml
<<: !include test_data/yast/encryption/activate_encrypted_volume.yaml
Expand Up @@ -4,7 +4,7 @@ description: >
pre-partitioned disk image to validate encrypted partitions activation. For
zVM we activate DASD disk which we format in from of the installation and create
encrypted partition on it, similarly to powerVM.
name: cryptlvm+activate_existing
name: activate_encrypted_volume
vars:
ENCRYPT_ACTIVATE_EXISTING: 1
FORMAT_DASD: pre_install
Expand All @@ -15,7 +15,7 @@ schedule:
- installation/disk_activation
- installation/scc_registration
- installation/encrypted_volume_activation
- console/validate_activation_encrypted_partition
- console/validate_encrypted_volume_activation
- installation/addon_products_sle
- installation/system_role
- installation/partitioning
Expand All @@ -30,8 +30,7 @@ schedule:
- installation/await_install
- installation/logs_from_installation_system
- installation/reboot_after_installation
- installation/boot_encrypt
- boot/reconnect_mgmt_console
- installation/first_boot
test_data:
<<: !include test_data/yast/encryption/cryptlvm+activate_existing.yaml
<<: !include test_data/yast/encryption/activate_encrypted_volume.yaml
Expand Up @@ -4,7 +4,7 @@ description: >
pre-partitioned disk image to validate encrypted partitions activation. For
spvm we have to disable plymouth, so edit_optional_kernel_cmd_parameters module
is scheduled and OPT_KERNEL_PARAMS variable is set.
name: cryptlvm+activate_existing
name: activate_encrypted_volume
vars:
OPT_KERNEL_PARAMS: console=%SERIALDEV% VNCSize=1024x768
DESKTOP: textmode
Expand All @@ -15,7 +15,7 @@ schedule:
- installation/accept_license
- installation/scc_registration
- installation/encrypted_volume_activation
- console/validate_activation_encrypted_partition
- console/validate_encrypted_volume_activation
- installation/addon_products_sle
- installation/system_role
- installation/partitioning
Expand All @@ -34,7 +34,6 @@ schedule:
- installation/reboot_after_installation
- boot/reconnect_mgmt_console
- installation/grub_test
- installation/boot_encrypt
- installation/first_boot
test_data:
mapped_device: '/dev/mapper/cr-auto-1'
Expand Down
2 changes: 1 addition & 1 deletion schedule/yast/encryption/cryptlvm+cancel_existing.yaml
Expand Up @@ -3,7 +3,7 @@ description: >
Conduct installation cancelling encrypted partitions activation, and creating
encrypted lvm setup from scratch. Using pre-partitioned disk image to validate
encrypted partitions activation and that we can re-ecnrypt the disk.
name: cryptlvm+activate_existing
name: cryptlvm+cancel_existing
vars:
ENCRYPT: 1
ENCRYPT_CANCEL_EXISTING: 1
Expand Down
4 changes: 2 additions & 2 deletions tests/autoyast/installation.pm
Expand Up @@ -47,7 +47,7 @@ use Utils::Backends 'is_pvm';
use scheduler 'get_test_suite_data';
use autoyast 'test_ayp_url';
use y2_logs_helper qw(upload_autoyast_profile upload_autoyast_schema);
use validate_encrypt_utils "validate_activation_encrypted_partition";
use validate_encrypt_utils "validate_encrypted_volume_activation";

my $confirmed_licenses = 0;
my $stage = 'stage1';
Expand Down Expand Up @@ -230,7 +230,7 @@ sub run {
}
elsif (match_has_tag('autoyast-confirm')) {
if (get_var('ENCRYPT_ACTIVATE_EXISTING')) {
validate_activation_encrypted_partition({
validate_encrypted_volume_activation({
mapped_device => $test_data->{mapped_device},
device_status => $test_data->{device_status}->{message},
properties => $test_data->{device_status}->{properties}
Expand Down
Expand Up @@ -24,7 +24,7 @@ use validate_encrypt_utils;

sub run {
my $test_data = get_test_suite_data();
validate_activation_encrypted_partition({
validate_encrypted_volume_activation({
mapped_device => $test_data->{mapped_device},
device_status => $test_data->{device_status}->{message},
properties => $test_data->{device_status}->{properties}
Expand Down
4 changes: 0 additions & 4 deletions tests/installation/boot_encrypt.pm
Expand Up @@ -19,10 +19,6 @@ use utils;
use testapi qw(get_var record_info);

sub run {
if (get_var('ENCRYPT_ACTIVATE_EXISTING') and !get_var('ENCRYPT_FORCE_RECOMPUTE')) {
record_info 'bsc#993247 https://fate.suse.com/321208', 'activated encrypted partition will not be recreated as encrypted';
return;
}
unlock_if_encrypted(check_typed_password => 1);
}

Expand Down