Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

iSCSI SBPS: Fallback to default IMS user policy for CPS #302

Merged
merged 3 commits into from
Sep 12, 2024

Conversation

ravikanth-nalla-hpe
Copy link
Contributor

@ravikanth-nalla-hpe ravikanth-nalla-hpe commented Sep 12, 2024

Summary and Scope

CASMPET-7225: Fallback to default IMS user policy for CPS

We must have writable access to "/var/lib/cps-local/boot-images" mount directory of "boot-images" bucket order for CPS to function. CPS creates cos-config-data under "/var/lib/cps-local/boot-images"(information for the contents projected by DVS. User also need write access while removing cos-config-data under "/var/lib/cps-local/boot-images", when he wants to disable CPS.

Since for CSM-1.6 and USS-1.2 we are supporting CPS, we need to make it writable. When CPS will be removed in USS-1.3, we can fallback again to dedicated s3fs read-only policy.

Issues and Related PRs

List and characterize relationship to Jira/Github issues and other pull requests. Be sure to list dependencies.

  • Resolves [issue id](issue link)
  • Change will also be needed in <insert branch name here>
  • Future work required by [issue id](issue link)
  • Documentation changes required in [issue id](issue link)
  • Merge with/before/after <insert PR URL here>

Testing

bare metal cluster surtur

Tested on:

surtur

Test description:

  • Verified the CFS Ansible plays deployment with disablement of role w.r.t s3fs mount of "boot-images" bucket with s3 read only policy and see that existing mount of "boot-images" with default IMS user policy is not impacted.

Risks and Mitigations

None

Pull Request Checklist

  • [ NA] Version number(s) incremented, if applicable
  • Copyrights updated
  • [ NA] License file intact
  • Target branch correct
  • CHANGELOG.md updated
  • Testing is appropriate and complete, if applicable
  • [NA] HPC Product Announcement prepared, if applicable

…th IMS user policy

- Disable mount_s3_images role for now in order to default to earlier s3fs mount
  of boot-images bucket with IMS user policy to allow CPS with write access to
  "/var/lib/cps-local/boot-images" mount path. We can enable this role once
  CPS is removed in USS-1.3.
@mharding-hpe mharding-hpe merged commit bb63b57 into develop Sep 12, 2024
4 checks passed
@mharding-hpe mharding-hpe deleted the CASMPET-7225-iSCSI-SBPS branch September 12, 2024 21:58
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants