@@ -111,7 +111,7 @@ sudo LANG=C chroot $FILESYSTEM_ROOT mount
111
111
[ -d $TRUSTED_GPG_DIR ] && [ ! -z " $( ls $TRUSTED_GPG_DIR ) " ] && sudo cp $TRUSTED_GPG_DIR /* ${FILESYSTEM_ROOT} /etc/apt/trusted.gpg.d/
112
112
113
113
# # Pointing apt to public apt mirrors and getting latest packages, needed for latest security updates
114
- scripts/build_mirror_config.sh files/apt $CONFIGURED_ARCH $IMAGE_DISTRO
114
+ scripts/build_mirror_config.sh files/apt $CONFIGURED_ARCH $IMAGE_DISTRO
115
115
sudo cp files/apt/sources.list.$CONFIGURED_ARCH $FILESYSTEM_ROOT /etc/apt/sources.list
116
116
sudo cp files/apt/apt.conf.d/{81norecommends,apt-{clean,gzip-indexes,no-languages},no-check-valid-until,apt-multiple-retries} $FILESYSTEM_ROOT /etc/apt/apt.conf.d/
117
117
294
294
# # Install Kubernetes master
295
295
echo ' [INFO] Install kubernetes master'
296
296
install_kubernetes ${MASTER_KUBERNETES_VERSION}
297
-
297
+
298
298
sudo https_proxy=$https_proxy LANG=C chroot $FILESYSTEM_ROOT curl -fsSL \
299
299
https://packages.microsoft.com/keys/microsoft.asc | \
300
300
sudo LANG=C chroot $FILESYSTEM_ROOT apt-key add -
309
309
sudo LANG=C chroot $FILESYSTEM_ROOT apt-get -y remove gnupg
310
310
sudo https_proxy=$https_proxy LANG=C chroot $FILESYSTEM_ROOT curl -o /tmp/cri-dockerd.deb -fsSL \
311
311
https://github.com/Mirantis/cri-dockerd/releases/download/v${MASTER_CRI_DOCKERD} /cri-dockerd_${MASTER_CRI_DOCKERD} .3-0.debian-${IMAGE_DISTRO} _amd64.deb
312
- sudo LANG=C chroot $FILESYSTEM_ROOT apt-get -y install -f /tmp/cri-dockerd.deb
312
+ sudo LANG=C chroot $FILESYSTEM_ROOT apt-get -y install -f /tmp/cri-dockerd.deb
313
313
sudo LANG=C chroot $FILESYSTEM_ROOT rm -f /tmp/cri-dockerd.deb
314
314
else
315
315
echo ' [INFO] Skipping Install kubernetes master'
@@ -447,6 +447,14 @@ sudo LANG=C DEBIAN_FRONTEND=noninteractive chroot $FILESYSTEM_ROOT apt-get -y in
447
447
systemd-sysv \
448
448
ntp
449
449
450
+ # Workaround for issue: The udev rule may fail to be executed because the
451
+ # daemon-reload command is executed in parallel
452
+ # Github issue: https://github.com/systemd/systemd/issues/24668
453
+ # Github PR: https://github.com/systemd/systemd/pull/24673
454
+ # This workaround should be removed after a upstream already contains the fixes
455
+ sudo patch $FILESYSTEM_ROOT /lib/systemd/system/systemd-udevd.service \
456
+ files/image_config/systemd/systemd-udevd/fix-udev-rule-may-fail-if-daemon-reload-command-runs.patch
457
+
450
458
if [[ $TARGET_BOOTLOADER == grub ]]; then
451
459
if [[ $CONFIGURED_ARCH == amd64 ]]; then
452
460
GRUB_PKG=grub-pc-bin
@@ -637,10 +645,10 @@ then
637
645
fi
638
646
639
647
# #################
640
- # secure boot
648
+ # secure boot
641
649
# #################
642
650
if [[ $SECURE_UPGRADE_MODE == ' dev' || $SECURE_UPGRADE_MODE == " prod" && $SONIC_ENABLE_SECUREBOOT_SIGNATURE != ' y' ]]; then
643
- # note: SONIC_ENABLE_SECUREBOOT_SIGNATURE is a feature that signing just kernel,
651
+ # note: SONIC_ENABLE_SECUREBOOT_SIGNATURE is a feature that signing just kernel,
644
652
# SECURE_UPGRADE_MODE is signing all the boot component including kernel.
645
653
# its required to do not enable both features together to avoid conflicts.
646
654
echo " Secure Boot support build stage: Starting .."
@@ -649,14 +657,14 @@ if [[ $SECURE_UPGRADE_MODE == 'dev' || $SECURE_UPGRADE_MODE == "prod" && $SONIC_
649
657
sudo LANG=C DEBIAN_FRONTEND=noninteractive chroot $FILESYSTEM_ROOT apt-get -y install \
650
658
shim-unsigned \
651
659
grub-efi
652
-
660
+
653
661
if [ ! -f $SECURE_UPGRADE_SIGNING_CERT ]; then
654
662
echo " Error: SONiC SECURE_UPGRADE_SIGNING_CERT=$SECURE_UPGRADE_SIGNING_CERT key missing"
655
663
exit 1
656
664
fi
657
665
658
666
if [[ $SECURE_UPGRADE_MODE == ' dev' ]]; then
659
- # development signing & verification
667
+ # development signing & verification
660
668
661
669
if [ ! -f $SECURE_UPGRADE_DEV_SIGNING_KEY ]; then
662
670
echo " Error: SONiC SECURE_UPGRADE_DEV_SIGNING_KEY=$SECURE_UPGRADE_DEV_SIGNING_KEY key missing"
0 commit comments