ansible: lxd: Disable secureboot on the ci-rootnode profile
authorKienan Stewart <kstewart@efficios.com>
Tue, 24 Oct 2023 20:23:45 +0000 (16:23 -0400)
committerKienan Stewart <kstewart@efficios.com>
Fri, 10 Nov 2023 16:46:20 +0000 (11:46 -0500)
The rootnodes are typically VMs (currently managed via libvirt rather
than lxd). However, the profile is still useful when launching VMs
from images for testing, eg.

lxc launch -p default -p ci-rootnode --vm images:debian/10/cloud/amd64

Without disabling secureboot, extra steps are required to load any
built kernel modules.

Change-Id: I65ec94cf6e2891c27e437a3b1a4e8126f81487da

automation/ansible/roles/lxd/templates/init.yaml.j2

index f6210548d6e868d1cd5c8776ea85e66c56aa49ef..58802826c2765c1b8d3bbf7be108bdace1a0f1aa 100644 (file)
@@ -73,6 +73,7 @@ profiles:
     boot.autostart: "true"
     limits.cpu: "8"
     limits.memory: "8192MB"
+    security.secureboot: "false"
   description: "CI root node (VM)"
   devices:
     eth0:
This page took 0.023605 seconds and 4 git commands to generate.