/srv/irclogs.ubuntu.com/2017/05/12/#cloud-init.txt

smoserutlemming, could you on that bug also verify yakkety and zesty ?12:57
=== rangerpbzzzz is now known as rangerpb
utlemmingsmoser: done14:13
smoserthanks14:43
smoserblackboxsw, if you're wanting something to do before rharper comes around https://code.launchpad.net/~smoser/cloud-init/+git/cloud-init/+merge/32342015:28
smoserid' like your input there15:29
blackboxswlooking now. just SRU-ing have some interesting questions on nova-lxd creation from lxc image export .15:29
smoserok. if you want to chat, we coudl do that to wait also :)15:30
blackboxswI'm just hanging out in the standup channel15:30
blackboxswfor whenever rharper and smoser join15:30
smoserk15:31
rharpersmoser: in the standup now15:34
smoserjoiing15:35
smoser2 min15:35
rharperit's now 3 minutes past ...15:38
rharper=P15:38
blackboxswack he hid that from comments so it's no longer public15:41
blackboxswjust a heads up on that it was "released" to people who subscrived to the bug15:41
mikec_64is it possible to prevent an ssh authorized key from being added to root?  I only want the key added to the normal user16:00
rharperAFAICT no ssh keys are added to root; but we'd need to see the user-data16:54
rharperssh-import-id or other ssh key settings are done against the 'default' user;  in ubuntu images, this is the user ubuntu16:55
rharperubuntu user is also in the sudo group, so one can get root on the instance but it won't append ssh keys to the root user16:55
rharpermikec_64: ^^16:55
smosermikec_64, well, cloud-init adds the keys to root, but does so with a command that says 'hey, log in with other user'17:58
smoserend result is that you cannot log in as root with those keys.17:58
mikec_64ahh the issue I am running into is that puppet does not like keys that have the exact same content & name18:06
mikec_64I am changing my puppet setup to disallow root login and then just skip managing the root user18:07
rharpersmoser: huh, I didn't know that18:08
smoser$ ssh root@10.5.0.1218:11
smoserWarning: Permanently added '10.5.0.12' (ECDSA) to the list of known hosts.18:11
smoserPlease login as the user "ubuntu" rather than the user "root".18:11
smoserConnection to 10.5.0.12 closed.18:11
smoserhttp://paste.ubuntu.com/24562286/18:12
smoserrharper, can you mark 'approved' on the azure mp ? https://code.launchpad.net/~smoser/cloud-init/+git/cloud-init/+merge/32342018:13
smoserand give me links to anything you want me to look at right now18:13
rharpersmoser: I can. but one item I asked about was the extra os.path.realpaths()18:13
smoseryeah... the callers will all have 'realpath' already resolved.18:15
rharperack18:26
blackboxswwhew, finally down to the last xenial, yakkety zesty sru verification https://bugs.launchpad.net/cloud-init/+bug/168486919:47
ubot5Ubuntu bug 1684869 in cloud-init "growing root partition does not always work with root=PARTUUID=" [Medium,Confirmed]19:47
smoserblackboxsw, \o/20:14
smoserthank you!20:14
blackboxswsmoser: so I'm on the last one20:52
blackboxswxenial of the above mentioned bug20:52
blackboxswaw=xenial-server-cloudimg-amd64-proposed.img20:52
blackboxswcsmith@fringe:~$  ptuuid=$(sfdisk --part-uuid $raw 1)20:52
blackboxswsfdisk: xenial-server-cloudimg-amd64-proposed.img: no partition table found20:52
blackboxswsfdisk worked for both yakkety and zesty raws20:52
blackboxsw file $raw20:54
blackboxswxenial-server-cloudimg-amd64-proposed.img: QEMU QCOW Image (v3), has backing file (path xenial-server-cloudimg-amd64.raw), 2361393152 bytes20:54
rharperv3 ?20:55
blackboxswstrange as zesty is zesty-server-cloudimg-amd64.raw: DOS/MBR boot sector, extended partition table (last)20:55
blackboxswsame w/ yakkety20:55
rharperfile says that everywhere , strange20:56
rharperso, so you have a backed image20:56
blackboxswwhoops20:56
blackboxswbah20:57
rharperbasically someone built a qcow file on top of the original20:57
rharperfor proposed, which makes sense20:57
blackboxswI grabbed xenial-server-cloudimg-amd64-proposed.img instead of xenial--server-cloudimg-amd64.raw20:57
rharperah20:57
rharperthere you go20:57
blackboxswPEBKAC20:57
rharperit's Friday20:57
blackboxswnot for loooooong ;)20:57
rharperLOL21:01
* rharper checks watch21:01
rharperhrm, looking a lot like beer-thirty21:01
blackboxswhmm yeak just confirming, same issue w/ the raw file21:18
blackboxswhttps://www.irccloud.com/pastebin/Xilq7ov2/21:19
blackboxswsomething xenial specific it seems21:19
blackboxswthe xenial image doesn't have an extended partition table definition like the zesty and yakkety raw images21:25
rharperhrm21:26
rharperoh, that's because it's not GPT based21:27
rharperyakkety and newer are unified (uefi + legacy)21:27
rharperwhich requires GPT (uefi does)21:27
rharpernot sure why the zesty image showed msdos though21:27
rharperblackboxsw: yeah, yak and zesty have GPT based partitions, xenial has ms/dos ;  I think that;s the difference21:32
rharperblackboxsw: you may need to use blkid -o export on a kpartx mounted image file21:34
rharpersudo kpartx -va path/to/image; (will print which mapper device) then you can sudo blkid -o export /dev/mapper/loopNp121:35
rharperit should print a PARTUUID= value21:35
blackboxswthanks rharper. til about kpartx hadn't used it before21:39
rharperyeah, so -va (verbose add) and -vd (verbose delete) are most helpful21:39
rharperespecially with dealing with GPT images which have 2 partitions which you can't mount before your get to the rootfs21:39
rharperit just reads pt , calculates offsets and auto configures a loop devivce with the offsets21:40
rharperhelps for LVM devices as well21:40
blackboxswok yakkety and zesty are done. xenial is a bit locked up because I don't know the qemu foo to get and boot off the xenial partition22:21

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!