Installation is no longer configuring canonical-certification.conf

Bug #1945526 reported by Rod Smith
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
maas-cert-server
New
Undecided
Unassigned

Bug Description

Installing via MAAS, as configured via maniacs-setup, SHOULD make changes to /etc/xdg/canonical-certification.conf for the local environment (local iperf server, KVM and LXD images, etc.); but this is no longer working. I believe this is a consequence of the fact that uvtool-libvirt is no longer being fully configured (as described in comment #2 to bug #1931586), which is leaving /etc/xdg/canonical-certification.conf named /etc/xdg/canonical-certification.conf-new when our custom curtin scripts run, so our scripts can't find the right file. We should either figure out how to fix the configuration problem with uvtool-libvirt or find another way around this problem.

Related branches

Revision history for this message
Jeff Lane  (bladernr) wrote (last edit ):

as a quick fix, I'd propose making this change to the preseed:

 61 - &installcert
 62 #!/bin/sh
 63 echo "Installing certification tools...";
 64 echo " Running apt-get update...";
 65 apt-get update;
 66 echo " Installing checkbox certification...";
 67 echo "postfix postfix/mailname string maas.example.com" | debconf-set-selections;
 68 echo "postfix postfix/main_mailer_type string 'No Configuration'" | debconf-set-selections;
INSERT apt-get install -y --allow-unauthenticated uvtool-libvirt
INSERT apt-get -f install
 69 apt-get install -y --allow-unauthenticated dmidecode canonical-certification-server;
 70 sleep 60;
 71 echo "Done.";

It's a kludge, but should resolve the issues before we install CCS and populate the config file.

Note, since the issue seems to be how/when we're installing uvtool-libvirt (in an ephemeral environment) then I can't think of a better way to do this, aside from moving all this to a startup script instead that is run during the inital boot after deployment is complete.

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.