On 5/28/2012 6:27 AM, Derek Wuelfrath wrote:
Barry,

On 5/25/12 17:09 , Barry Quiel wrote:
On 5/22/2012 6:05 AM, Derek Wuelfrath wrote:
Hi Barry

On 5/21/12 17:25 , Barry Quiel wrote:
I'm trying to upgrade my CentOS 6 box from 3.1.0 to 3.3.2 using packages
from packetfence.org.

Going through the UPGRADE doc I apply 2 database schema updates do a yum
reinstall packetfence-freeradius2.  I then run install.pl.  Everything
to this point is fine.  When I run configurator.pl it recognizes that
its an upgrade, but at the end it spits out an empty pf.conf and
networks.conf.
After an upgrade process, it is not mandatory to use installer.pl neither configurator.pl. Every changes that need to be taken care of are well documented in the UPGRADE document. It's usually consist of a few database schema updates, new/removed/modified config parameters.

We no longer maintain the configurator.pl script for the upgrade process. We are currently working on a new web-based installer/configurator
that will handle upgrade processes.
You're right there is no mention of running configurator.pl in the UPGRADE doc. But there is mention of it when you add the rpm. The thing I would suggest here is to remove the output from the rpm to eliminate the confusion. In my case I tried to do both, the directions in the UPGRADE doc and the directions from the output of installing the RPM
Yes it is a generic message at the end of the rpm install (in case of first install...) but since we're currently working on a totally new configurator, we won't change anything there.

A search for "empty pf.conf" on the mail archives comes back with nothing.

A search for "empty pf.conf" on the bug tracker comes back with #579
which looks unrelated.

Even if I remove pf.conf and networks.conf to make configurator.pl think
it is a new install and not an upgrade it still creates empty files.

Any assistance would be greatly appreciated.

What I can suggest you would be to use the old config files (the ones before you use the configurator.pl script). If you didn't backup those, the script should have done this for you. You should have pf.conf.old and networks.conf.old. Remove the .old extensions and make sure you go through the UPGRADE document to apply the correct changes.

Don't hesitate to reply in case of any other problems.

Thanks!
Well, I'm glad you asked I am having a bit if an issue. This was a working ( although limited since not fully deployed ) 3.1.0 box. Now when I try to start pf I get the following:

Starting PacketFence...Checking configuration sanity...
Use of uninitialized value $net{"named"} in pattern match (m//) at /usr/local/pf/lib/pf/pfcmd/checkup.pm line 362. Use of uninitialized value $net{"dhcpd"} in pattern match (m//) at /usr/local/pf/lib/pf/pfcmd/checkup.pm line 369.
FATAL - please define exactly one management interface
FATAL - internal network(s) not defined!

So I went and looked at the networks defined in network.conf and interfaces defined in pf.conf. Everything seems right. I couldn't find any notes on changes to the configuration, so I'm not really sure whats wrong. From my perspective it was working, there were no changes in the configuration requirements, and now it doesn't work. I tried commenting out in various combinations the interface and network definitions so I could at least get pf to start. I figured then I could get into the admin web interface and configure the networks and interfaces. I thought it might re-write those files and make the problem go away. That plan failed.

Here is the contents of the networks.conf:

[192.168.20.0]
type=vlan-registration
netmask=255.255.255.0
gateway=192.168.20.1
next_hop=
named=enabled
dns=192.168.20.1
domain-name=registration.chico.sungardps.lcl
dhcpd=enabled
dhcp_start=192.168.20.20
dhcp_end=192.168.20.250
dhcp_default_lease_time=20
dhcp_max_lease_time=20

[192.168.11.0]
type=internal
netmask=255.255.255.0
gateway=192.168.11.1
dns=10.247.161.100,10.247.161.101
domain-name=chico.sungardps.lcl
dhcpd=disabled
named=disabled


And the what I believe to be the relevant piece of pf.conf :

[interface eth0]
ip=192.168.11.50
mask=255.255.255.0
gateway=192.168.11.1
type=management

[interface eth1]
ip=192.168.20.1
mask=255.255.255.0
gateway=192.168.20.1
type=internal
enforcement=vlan

As you can see I do have a management interface defined and an internal network defined. So I scratch my head. I wonder if there is some other parsing error ( maybe a typo on my part, although I haven't made any changes and this was a working 3.1.0 config ) in checkup.pm
Do you mind on sending me both pf.conf and networks.conf.

Thanks!
I have attached the conf files.
[192.168.20.0]
type=vlan-registration
netmask=255.255.255.0
gateway=192.168.20.1
next_hop=
named=enabled
dns=192.168.20.1
domain-name=registration.chico.sungardps.lcl
dhcpd=enabled
dhcp_start=192.168.20.20
dhcp_end=192.168.20.250
dhcp_default_lease_time=20
dhcp_max_lease_time=20

[192.168.11.0]
type=internal
netmask=255.255.255.0
gateway=192.168.11.1
dns=10.247.161.100,10.247.161.101
domain-name=chico.sungardps.lcl
dhcpd=disabled
named=disabled
[general]
#
# general.domain
#
# Domain name of PacketFence system.
domain=chico.sungardps.lcl
timezone=America/Los_Angeles

[trapping]
#
# trapping.range
#
# Comma-delimited list of address ranges/CIDR blocks that PacketFence will 
monitor/detect/trap on.  Gateway, network, and 
# broadcast addresses are ignored.
range=192.168.20.0/24
#
# trapping.registration
#
# If enabled, nodes will be required to register on first network access.  
Further registration options are configured in the 
# registration section.
registration=enabled

[registration]
#
# registration.auth
#
# Method by which registering nodes will be authenticated.  Templates for LDAP, 
RADIUS, Kerberos, local and guests are 
# available at <conf_dir>/authentication.  If you wish to use a different 
authentication mechanism, simply create 
# a file called <conf_dir>/authentication/<authname>.pm, fill it with the 
necessary data, and set 
# auth=<authname>.  The default value, local, relies on a local access file in 
<conf_dir>/user.conf.
auth=ldap
expire_mode=window
expire_window=24h

[alerting]
#
# alerting.emailaddr
#
# Email address to which notifications of rogue DHCP servers, violations with 
an action of "email", or any other 
# PacketFence-related message goes to.
emailaddr=<removed>
fromaddr=<removed>
smtpserver=<removed>

#
[database]
#
# database.pass
#
# Password for the mysql database used by PacketFence.
pass=<removed>

[servicewatch]
#
# servicewatch.restart
#
# should pfcmd service pf watch restart PF if services are not running
restart=enabled

[vlan]
closelocationlogonstop=enabled

[expire]
node=240h

[interface eth0]
ip=192.168.11.50
mask=255.255.255.0
gateway=192.168.11.1
type=management

[interface eth1]
ip=192.168.20.1
mask=255.255.255.0
gateway=192.168.20.1
type=internal
enforcement=vlan
------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to