[MIR] cobbler-enlist source and binaries
Bug #860492 reported by
Dave Walker
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
cobbler-enlist (Ubuntu) |
Fix Released
|
High
|
Unassigned | ||
Oneiric |
Fix Released
|
High
|
Unassigned |
Bug Description
Availability: Currently in Ubuntu Oneiric, and builds on all target arches
Rationale: Required to be shipped on the ISO, as a menu option via a udeb.
Security: Fairly new package, native to Ubuntu. Possible concern is that it doesn't use SSL transport.
Quality assurance: Small C tool, which is Ubuntu native.
UI standards: D-I UI, with translatable strings.
Dependencies: All satisfied
Standards compliance: Lintian clean
Maintenance: Lovingly cared for by the Ubuntu Server Team.
summary: |
- [MIR] cobbler-enlist + [MIR] cobbler-enlist src, cobbler-enlist-udeb bin |
tags: | added: server-o-mir |
Changed in cobbler-enlist (Ubuntu): | |
importance: | Undecided → High |
Changed in cobbler-enlist (Ubuntu Oneiric): | |
milestone: | none → ubuntu-11.10 |
tags: | added: rls-mgr-o-tracking |
To post a comment you must log in.
This tool is designed to 'enlist' with a cobbler server for future deployment. This tool is the first basic step of hardware discovery (normally of new hardware), then it is no-longer used.
In the current form, the only useful data sent home is the interfaces mac addresses. Next cycle, more data about the hardware will be sent home - including disk sizes, RAM and if the system supports virt extensions.
There is pending support to add it to the cd menu for people to 'try it'... however the main target is the ability to do netbooting with the debconf questions pre-answered, including cobbler credentials.
The udeb is never used on a live system, it's only target is to discover hardware then the system halts. debian-installer is hijacked to provide a volatile environment to run this tool. When this tool is used, the system should always halt.
It does not have SSL support, as debian-installer cannot currently retrieve ssl preseeds (bug 833994). It seemed pointless to receive the credentials via http and post back using https, when the returning data doesn't exactly add provided data to what was already received insecurely.
However, when bug 833994 is resolved - we will look at adding ssl support (and maybe even include the fingerprint via the preseed for self-signed).