IF YOU WOULD LIKE TO GET AN ACCOUNT, please write an
email to Administrator. User accounts are meant only to access repo
and report issues and/or generate pull requests.
This is a purpose-specific Git hosting for
BaseALT
projects. Thank you for your understanding!
Только зарегистрированные пользователи имеют доступ к сервису!
Для получения аккаунта, обратитесь к администратору.
* Shareable only on supported hypervisors
* Fix disk-attach
* Restrict shareable disks to SHARED datastores
* On image clone: copy SHAREABLE depends on DEFAULT_IMAGE_PERSISTENT flag
* F #5257: Remove econe server
Also, disable hybrid section by default in Sunstone
* F #5257: Revert onecfg change
* remove amazon-ec2 unneeded gem
* remove file no longer present from install.sh
* F #1345: KVM support for persistent luks volmes
Support for attaching a persistent qemu luks encrypted disk, created as
per the libvirt/qemu documentation.
Private secret must be defined on the hypervisor for decryption and the
image should contain "LUKS_SECRET" attribute.
1) Create the image and import into datastore:
# qemu-img create --object secret,id=sec0,data=secretphrase -o key-secret=sec0 -f luks volume 1G
2) Create the secret on the hypervisor:
# virsh secret-define volume-secret.xml
# MYSECRET=`printf %s "secretphrase" | base64`
# virsh secret-set-value $MYUUID $MYSECRET
# virsh secret-dumpxml $MYUUID
<secret ephemeral='no' private='yes'>
<uuid>$MYUUID</uuid>
<description>luks key</description>
<usage type='volume'>
<volume>rbd:one/one-123</volume>
</usage>
</secret>
3) Set the UUID in the image attributes, ie:
# oneimage show 123 |grep LUKS
LUKS_SECRET="$MYUUID"
This should allow the disk attach to decryt the luks image and
use as a normal disk within the VM.
Co-authored-by: Laurence <laurencegill@users.noreply.github.com>
- set `opennebula_ssh_deploy_private_key` to make sure HVs can see each other.
- Add network hooks remote execution (clean)
- Rename Elastic.rb to elastic.rb