From 4c636f393234e22fd402c8dd67fe66c016fea2ea Mon Sep 17 00:00:00 2001 From: Kienan Stewart Date: Tue, 24 Oct 2023 16:23:45 -0400 Subject: [PATCH] ansible: lxd: Disable secureboot on the ci-rootnode profile The rootnodes are typically VMs (currently managed via libvirt rather than lxd). However, the profile is still useful when launching VMs from images for testing, eg. lxc launch -p default -p ci-rootnode --vm images:debian/10/cloud/amd64 Without disabling secureboot, extra steps are required to load any built kernel modules. Change-Id: I65ec94cf6e2891c27e437a3b1a4e8126f81487da --- automation/ansible/roles/lxd/templates/init.yaml.j2 | 1 + 1 file changed, 1 insertion(+) diff --git a/automation/ansible/roles/lxd/templates/init.yaml.j2 b/automation/ansible/roles/lxd/templates/init.yaml.j2 index f621054..5880282 100644 --- a/automation/ansible/roles/lxd/templates/init.yaml.j2 +++ b/automation/ansible/roles/lxd/templates/init.yaml.j2 @@ -73,6 +73,7 @@ profiles: boot.autostart: "true" limits.cpu: "8" limits.memory: "8192MB" + security.secureboot: "false" description: "CI root node (VM)" devices: eth0: -- 2.34.1