I just attempted to reproduce this and it's even more broken than I originally thought.
While we hit c#0 when creating the image based encrypted NFS volume we then also see os-brick overwriting the entire original file with a symlink to the decrypted dm-crypt device:
I just attempted to reproduce this and it's even more broken than I originally thought.
While we hit c#0 when creating the image based encrypted NFS volume we then also see os-brick overwriting the entire original file with a symlink to the decrypted dm-crypt device:
$ openstack volume type create --encryption- provider nova.volume. encryptors. luks.LuksEncryp tor --encryption-cipher aes-xts-plain64 --encryption- key-size 256 --encryption- control- location front-end LUKS 0.5.1-x86_ 64-disk --type LUKS --size 1 test-encrypted- image 4194-4972- 9292-b60c97c824 e2 |
$ openstack volume create --image cirros-
[..]
| id | 9b3a4f89-
[..]
$ ll /opt/stack/ data/cinder/ mnt/896fb15da60 36b68a917322e72 ebfe57/ volume- * data/cinder/ mnt/896fb15da60 36b68a917322e72 ebfe57/ volume- 9b3a4f89- 4194-4972- 9292-b60c97c824 e2 crypt-volume- 9b3a4f89- 4194-4972- 9292-b60c97c824 e2
lrwxrwxrwx. 1 root root 61 Aug 21 08:24
/opt/stack/
-> /dev/mapper/
^ removing the original encrypted file entirely, so before fixing c#0 we also need to resolve this.