Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cannot deploy password-enabled template on a L2 network #10101

Open
weizhouapache opened this issue Dec 13, 2024 · 2 comments
Open

Cannot deploy password-enabled template on a L2 network #10101

weizhouapache opened this issue Dec 13, 2024 · 2 comments

Comments

@weizhouapache
Copy link
Member

weizhouapache commented Dec 13, 2024

Got an exception:
Unable to deploy VM as template 203 is password enabled, but there is no support for UserData service in the default network

The template have a default user/password so I do not want a new password

ISSUE TYPE
  • Bug Report
COMPONENT NAME

CLOUDSTACK VERSION
4.20 (and may be all versions)
CONFIGURATION
OS / ENVIRONMENT
SUMMARY
STEPS TO REPRODUCE

EXPECTED RESULTS

ACTUAL RESULTS

@DaanHoogland
Copy link
Contributor

DaanHoogland commented Dec 13, 2024

Hey @weizhouapache , this is actually a feature I had wanted before , because of testing. I never got around entering it. So we want to not provision a password on a password enabled template at times (deploy-time-switch or such.

Though I read from your message, you want it automatically; i.e. check for user data support in the network.

I consider it a new feature or at least an improvement.

@DaanHoogland DaanHoogland added this to the 4.21.0 milestone Dec 13, 2024
@weizhouapache
Copy link
Member Author

weizhouapache commented Dec 13, 2024

Hey @weizhouapache , this is actually a feature I had wanted before , because of testing. I never got around entering it. So we want to not provision a password on a password enabled template at times (deploy-time-switch or such.

Though I read from your message, you want it automatically; i.e. check for user data support in the network.

I consider it a new feature or at least an improvement.

my opinion is

  • if the template is password-enabled and network supports Userdata, automatically generate a new password
  • otherwise, do not generate new password automatically. for example
    • template is not password-enabled
    • network (e.g. a L2 network) does not support Userdata . Currently this throws an exception

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants