-
Notifications
You must be signed in to change notification settings - Fork 19
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: dashmate for seeds #535
Conversation
I'll try and deploy this on testnet seed-3 once the 0.24.22 dashmate release is complete. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Code reviewed and approved in concept, waiting for dashmate release for testing on testnet, so please don't merge yet.
There appears to be an error in the logic on initial startup, where immediately after starting all services, the dashmate role then attempts to restart them, which fails. Ansible output:
|
This is also not quite idempotent yet, running the |
Other than the above logic issue, this seems to be working fine. It's a bit inefficient to run through the whole ZeroSSL workflow, assign a cert, and then shut down the DAPI container while leaving all the provisioned config and containers in place, but I think changing this would require significant changes to dashmate right? I think we can leave it for now, it's really great to be able to remove the entire I think we can also remove "convenient tasks" from lines 301-365 in the dashmate role, these tasks seem to be handled properly in dashmate now, right? |
Please add
|
While trying to update evonodes to the
|
Weirdly, I remember fixing this already in this branch 🤔 . Fixed once again
Yes, the idempotency is not yet stable, because we often change a lot of values during dashmate setup manually, that causes config re-render.
We probably would want to skip that part and use self signed for example, but on the other side. Though we will still need dapis on the seeds later.
Fixed
I am going to look into that now |
In that case we can just leave the current setup, and change behaviour around the DAPI container shutdown when we enable it later. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
utACK
Issue being fixed or feature implemented
#514
What was done?
How Has This Been Tested?
On my own devnet + smoke tests
Breaking Changes
No
Checklist:
For repository code-owners and collaborators only