I would try running the scripts "by hand" while the install is going on.
I am blind so I always ssh to the machine and run scripts when I have
trouble with them. But you can press control+alt+f2 to get to a shell
and run them.
If your script is named, myscript.sh, you'd type,
"/var/lib/fai/config/scripts/myscript.sh".
I'm assuming you have enabled either ssh or virtual terminal in your
pxe config. Something like "FAI_FLAGS=sshd" or "FAI_FLAGS=createvt".
On 06/24/2016 11:52 AM, Denny Bortfeldt wrote:
Can you upload your fai.log, shell.log and an output of your scripts folder?
2016-06-24 18:48 GMT+02:00 Ronald Steele <[email protected]>:
Yes, it’s excitable. That was my first thought too.
ls -l reports
-rwxr-xr-x 1 root root …
The same permissions are on the directory, which matches all the other
script directories.
Ron
On Jun 24, 2016, at 10:16 AM, Denny Bortfeldt <[email protected]> wrote:
Are you sure that your script in <CLASS>/<nr>-<name> got chmod +x ?
Without execution flag the script will not get executed.
2016-06-24 15:59 GMT+02:00 Ronald Steele <[email protected]>:
I’m trying to use scripts to install application software. The scripts
never get executed.
If I embed the same script code into to one of the existing scripts (say
CENTOS) the code works, however any scripts I create are never executed.
The script’s file permissions are the same as the existing scripts. The
class name is defined in .../class/50-host-classes and appears in the log
files in variables.log and fai.log (but never in shell.log).
Thanks for any ideas.
Ron
------------------------------
Spam
<https://antispam.roaringpenguin.com/canit/b.php?i=0aRaCgUWx&m=114e6b607ad9&t=20160624&c=s>
Phish/Fraud
<https://antispam.roaringpenguin.com/canit/b.php?i=0aRaCgUWx&m=114e6b607ad9&t=20160624&c=p>
Not spam
<https://antispam.roaringpenguin.com/canit/b.php?i=0aRaCgUWx&m=114e6b607ad9&t=20160624&c=n>
Forget previous vote
<https://antispam.roaringpenguin.com/canit/b.php?i=0aRaCgUWx&m=114e6b607ad9&t=20160624&c=f>
--
--
John G. Heim; [email protected]; sip://[email protected]