Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use the macsec_enabled flag in platform to enable macsec feature state #11998

Merged
merged 2 commits into from
Nov 8, 2022

Conversation

judyjoseph
Copy link
Contributor

@judyjoseph judyjoseph commented Sep 7, 2022

Why I did it

Plan to use the macsec capability flag in the platform - to enable macsec feature which inturn hep hostcfgd to start the macsec dockers

How I did it

Add a new flag "macsec_enabled" in the platform_env.conf in the platform directory - which states if that platform has macsec capability

Add a new API in device_info to get the macsec capability from platform and export to an environment variable MACSEC_SUPPORTED used in hostcfgd.

How to verify it

Verified that the MACSEC_SUPPORTED variable is updated as per the "macsec_enabled" flag set in the platform_env.conf -- and hostcfgd updates the macsec feature state accordingly.

Which release branch to backport (provide reason below if selected)

  • 201811
  • 201911
  • 202006
  • 202012
  • 202106
  • 202111
  • 202205

Description for the changelog

Link to config_db schema for YANG module changes

A picture of a cute animal (not mandatory but encouraged)

@abdosi
Copy link
Contributor

abdosi commented Sep 28, 2022

@anamehra can we add this flag for your platforms ?

@anamehra
Copy link
Contributor

@anamehra can we add this flag for your platforms ?

Sure @abdosi , will do the needful.

@judyjoseph judyjoseph force-pushed the macsec_feature_enable branch from 9aa34b6 to e0705e4 Compare September 29, 2022 21:24
@judyjoseph
Copy link
Contributor Author

/azp run

@azure-pipelines
Copy link

You have several pipelines (over 10) configured to build pull requests in this repository. Specify which pipelines you would like to run by using /azp run [pipelines] command. You can specify multiple pipelines using a comma separated list.

@judyjoseph
Copy link
Contributor Author

/AzurePipelines run Azure.sonic-buildimage

@azure-pipelines
Copy link

Azure Pipelines successfully started running 1 pipeline(s).

@sonic-net sonic-net deleted a comment from azure-pipelines bot Oct 7, 2022
@sonic-net sonic-net deleted a comment from azure-pipelines bot Oct 11, 2022
@judyjoseph
Copy link
Contributor Author

/AzurePipelines run Azure.sonic-buildimage

@azure-pipelines
Copy link

Azure Pipelines successfully started running 1 pipeline(s).

@judyjoseph
Copy link
Contributor Author

/AzurePipelines run Azure.sonic-buildimage

@azure-pipelines
Copy link

Azure Pipelines successfully started running 1 pipeline(s).

@judyjoseph
Copy link
Contributor Author

/AzurePipelines run Azure.sonic-buildimage

@azure-pipelines
Copy link

Azure Pipelines successfully started running 1 pipeline(s).

@judyjoseph judyjoseph merged commit c259c99 into sonic-net:master Nov 8, 2022
yxieca pushed a commit that referenced this pull request Nov 10, 2022
#11998)

* Use the macsec_enabled flag in platform to enable macesc feature state
* Add macsec supported metadata in DEVICE_RUNTIME_METADATA
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants