
This commit updated ipsec-client to store certs and keys in LUKS filesystem. The encrypted filesystem take some time to mount and decrypted, so a script was created to check if the filesystem is ready before start ipsec. Test Plan: PASS: Bootstrap, install and unlock a DX system with a worker. Wait until system reboots and verify unlocked enable available status. Then, observe IPSec is enabled, SAs are established and the symbolic links were created in the directories /etc/swanctl/x509 and /etc/swanctl/private pointing to file in the directory /var/luks/stx/luks_fs/ipsec/{certs,keys}. Story: 2010940 Task: 50086 Change-Id: Ifccd747bd1db8f565d4744d99d94a61a22d5890e Signed-off-by: Leonardo Mendes <Leonardo.MendesSantana@windriver.com>
24 lines
529 B
Desktop File
24 lines
529 B
Desktop File
[Unit]
|
|
Description=workerconfig service
|
|
After=syslog.target network.service remote-fs.target
|
|
After=sw-patch.service
|
|
After=affine-platform.sh.service
|
|
After=opt-platform.service
|
|
After=sysinv-agent.service
|
|
After=network-online.target
|
|
After=ipsec.service
|
|
Before=config.service worker-config-gate.service
|
|
Before=goenabled.service
|
|
|
|
[Service]
|
|
Type=simple
|
|
ExecStart=/etc/init.d/worker_config start
|
|
ExecStop=
|
|
ExecReload=
|
|
StandardOutput=syslog+console
|
|
StandardError=syslog+console
|
|
RemainAfterExit=yes
|
|
|
|
[Install]
|
|
WantedBy=multi-user.target
|