it just popped back to my mind that this only allows creation of an image in a proxy-ed environment, but the installed system will lack proxy configuration entirely!
I'm reopening this for discussion; do we want to:
a) do just enough to use the proxy during image creation
b) setup the proxy in the target system
c) add a flag to select between behavior a) and b)
it just popped back to my mind that this only allows creation of an image in a proxy-ed environment, but the installed system will lack proxy configuration entirely!
I'm reopening this for discussion; do we want to:
a) do just enough to use the proxy during image creation
b) setup the proxy in the target system
c) add a flag to select between behavior a) and b)
Currently we did a)