When a compute node comes up, we run `mkfs.xfs` on a newly encrypted
authorWard Vandewege <ward@curii.com>
Thu, 25 Feb 2021 22:52:24 +0000 (17:52 -0500)
committerWard Vandewege <ward@curii.com>
Thu, 25 Feb 2021 22:52:24 +0000 (17:52 -0500)
partition. Sometimes there are ghost filesystem signatures on those
partitions, make mkfs.xfs ignore partition signatures.

No issue #

Arvados-DCO-1.1-Signed-off-by: Ward Vandewege <ward@curii.com>

tools/compute-images/scripts/usr-local-bin-ensure-encrypted-partitions.sh

index 08579bf192fe5038974119e99743cf43961ca701..462158e043fc58213943aac2514081fb6fbba5ee 100644 (file)
@@ -114,7 +114,7 @@ head -c321 /dev/urandom >"$KEYPATH"
 echo YES | cryptsetup luksFormat "$LVPATH" "$KEYPATH"
 cryptsetup --key-file "$KEYPATH" luksOpen "$LVPATH" "$(basename "$CRYPTPATH")"
 shred -u "$KEYPATH"
-mkfs.xfs "$CRYPTPATH"
+mkfs.xfs -f "$CRYPTPATH"
 
 # First make sure docker is not using /tmp, then unmount everything under it.
 if [ -d /etc/sv/docker.io ]