Hi,
This is running xCAT 2.8.2 and installing CentOS 5.9 and 6.4.
getpostscript.awk is not returning postscripts, but we got them working again
by patching post.xcat so that getpostscripts.awk is no longer called.
Can anyone suggest how I can find out why getpostscript.awk isn't returning
postscripts?
Thanks
Notes:
Several changes were made including deploying service nodes, renaming the
management node, and setting site.precreatemypostscripts=yes. The policy
table wasn't changed, and the original certificates and ssh keys are still in
use. Normal xCAT commands work. Mknb has been run.
Postscripts weren't being run until the following changes were made to:
/opt/xcat/share/xcat/install/scripts/post.xcat
[root@drdxcatm scripts]# diff -c post.xcat.orig post.xcat
*** post.xcat.orig 2013-10-23 20:35:56.880161267 -0400
--- post.xcat 2013-10-23 18:14:33.159644728 -0400
***************
*** 30,35 ****
--- 30,36 ----
rm -rf /xcatpost/mypostscript
export NODE=#TABLE:nodelist:THISNODE:node#
wget -N --waitretry=10 --random-wait -T 60
http://$i$TFTPDIR/mypostscripts/mypostscript.$NODE -P /xcatpost 2>
/tmp/wget.log
+ chmod +x /xcatpost/* # GP
mv /xcatpost/mypostscript.$NODE /xcatpost/mypostscript
if [ ! -x /usr/bin/openssl ]; then #Stop if no openssl to
help the next bit
***************
*** 39,46 ****
export USEOPENSSLFORXCAT
XCATSERVER=$i:3001
export XCATSERVER
! mv $i/postscripts /xcatpost
! rm -rf $i
# If mypostscript doesn't exist, we will get it through
getpostscript.awk
if [ ! -x /xcatpost/mypostscript ]; then
--- 40,47 ----
export USEOPENSSLFORXCAT
XCATSERVER=$i:3001
export XCATSERVER
! #GP mv $i/postscripts /xcatpost
! #GP rm -rf $i
# If mypostscript doesn't exist, we will get it through
getpostscript.awk
if [ ! -x /xcatpost/mypostscript ]; then
Postscripts are being installed now, however I'm guessing the reason they
stopped working in the first place was because getpostscript.awk stopped
working. It's still not working, but the patch above prevents it from being
called. Below is the output from getpostscript.awk. The output is the same
whether or not an argument is provided.
export USEOPENSSLFORXCAT=1
export XCATSERVER=149.77.53.252:3001
bash-4.1# ./getpostscript.awk restore-fqdn
<xcatresponse>
<serverdone></serverdone>
</xcatresponse>
Running the openssl command manually produces the error below, which I believe
is a "normal" warning whenever self-signed certificates are used.
#!/bin/bash
export XCATSERVER=149.77.53.252:3001
openssl s_client -connect $XCATSERVER<<!
<xcatrequest>
<command>getpostscript</command>
</xcatrequest>
!
depth=1 CN = xCAT CA
verify error:num=19:self signed certificate in certificate chain
verify return:0
DONE
BTW. The output above is the error output. The standard output from the
openssl command is copied below. The original management node name was
"drdkvm0003". The new name is drdxcatm:
CONNECTED(00000003)
---
Certificate chain
0 s:/CN=drdkvm0003.nyc.desres.deshaw.com
i:/CN=xCAT CA
1 s:/CN=xCAT CA
i:/CN=xCAT CA
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=/CN=drdkvm0003.nyc.desres.deshaw.com
issuer=/CN=xCAT CA
---
No client certificate CA names sent
---
SSL handshake has read 1949 bytes and written 451 bytes
---
New, TLSv1/SSLv3, Cipher is AES256-SHA
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: zlib compression
Expansion: zlib compression
SSL-Session:
Protocol : TLSv1
Cipher : AES256-SHA
Session-ID:
27B4EE0FCC14B149BD95DE683A3DC4A774146E574345F6E1EA76FA66E00C827B
Session-ID-ctx:
Master-Key:
3840BEDB1A50D43AB61A932ECF6243C228BFCD37C57809F555C99B4A9AB5157B630CF6376E1247F56A2A48E2D480F17A
Key-Arg : None
Krb5 Principal: None
PSK identity: None
PSK identity hint: None
TLS session ticket:
0000 - 3c f3 c4 61 86 de a0 67-e9 b8 e1 87 0c f5 b4 41
<..a...g.......A
0010 - 80 cc 73 ff d1 62 cf 22-0e 43 0f 7e c6 2c c2 d4
..s..b.".C.~.,..
0020 - b0 5b a7 a5 7a da 58 c8-3c 3a 44 8e 47 48 87 4b
.[..z.X.<:D.GH.K
0030 - f7 0f 2e ea 51 d0 32 90-19 f9 c4 98 92 c4 12 ae
....Q.2.........
0040 - 4b 3e 69 ef a1 a9 a6 a3-6e dd 05 35 e7 d1 ec 3c
K>i.....n..5...<
0050 - d4 87 14 54 24 b4 3f 30-ec 9e 7e 74 a7 51 21 29
...T$.?0..~t.Q!)
0060 - 90 b1 c5 80 0f 75 ec 0c-a8 98 d3 bd dd 33 51 14
.....u.......3Q.
0070 - 75 da d1 18 cd f0 f2 64-7d ac 72 fb 91 9c d0 9b
u......d}.r.....
0080 - 55 be f1 b4 e0 75 ec 3d-8a b2 71 0f c3 57 bb 11
U....u.=..q..W..
0090 - 4f 75 dd ee 72 70 2d 3d-61 f4 91 b1 e6 b1 9b 0c
Ou..rp-=a.......
Compression: 1 (zlib compression)
Start Time: 1382711249
Timeout : 300 (sec)
Verify return code: 19 (self signed certificate in certificate
chain)
---
------------------------------------------------------------------------------
October Webinars: Code for Performance
Free Intel webinars can help you accelerate application performance.
Explore tips for MPI, OpenMP, advanced profiling, and more. Get the most from
the latest Intel processors and coprocessors. See abstracts and register >
http://pubads.g.doubleclick.net/gampad/clk?id=60135991&iu=/4140/ostg.clktrk
_______________________________________________
xCAT-user mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/xcat-user