Notifications
Clear all

[Solved] Carbonio Files CE unable to run pending-setups


yaroslav
(@yaroslav)
Joined: 4 months ago
Posts: 6
Topic starter  

Hello.

 

I've some issues when I'm trying to complete set up of carbonio files.

I don't know consul password and I'me getting this error:

insert the cluster credential password: service-discover: error: unable to open /etc/zextras/service-discover/cluster-credentials.tar.gpg: cannot find Cluster credential in /etc/zextras/service-discover/cluster-credentials.tar.gpg, please copy the file from the existing server

Carbonio packages have latest version and OS  is Ubuntu 20.04 with all updates.

The same issue I've had on temporary VM for experiment installation of Files addon.


Quote
yaroslav
(@yaroslav)
Joined: 4 months ago
Posts: 6
Topic starter  

Now I've the following error with "service-discover setup-wizard"

:

 

Spoiler
logs
    getsockname(3, {sa_family=AF_NETLINK, nl_pid=13264, nl_groups=00000000}, [112->12]) = 0

  getsockname(3, {sa_family=AF_NETLINK, nl_pid=13264, nl_groups=00000000}, [112->12]) = 0

         recvfrom(3, {{len=20, type=NLMSG_DONE, flags=NLM_F_MULTI, seq=1, pid=13264}, 0}, 4096, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, [112->12]) = 20

        getsockname(3, {sa_family=AF_NETLINK, nl_pid=13264, nl_groups=00000000}, [112->12]) = 0

close(3)  = 0

      write(1, "Create the cluster credentials p"..., 67Create the cluster credentials password (will be used for setups): ) = 67

      write(1, "", 0)          = 0

            read(0, "*", 256)        = 1

            futex(0xb57898, FUTEX_WAKE_PRIVATE, 1)  = 1

   futex(0xb57798, FUTEX_WAKE_PRIVATE, 1)  = 1

   write(1, "", 0)          = 0

         read(0, "*", 256)        = 1

         futex(0xb57898, FUTEX_WAKE_PRIVATE, 1)  = 1

  futex(0xb57798, FUTEX_WAKE_PRIVATE, 1)  = 1

write(1, "", 0)          = 0

        read(0, "*", 256)        = 1

      futex(0xb57898, FUTEX_WAKE_PRIVATE, 1)  = 1

              futex(0xb57798, FUTEX_WAKE_PRIVATE, 1)  = 1

     write(1, "", 0)          = 0

     futex(0xb57898, FUTEX_WAKE_PRIVATE, 1)  = 1

           futex(0xb57798, FUTEX_WAKE_PRIVATE, 1)  = 1

           read(0, "*", 256)        = 1

  futex(0xb57898, FUTEX_WAKE_PRIVATE, 1)  = 1

  futex(0xb57798, FUTEX_WAKE_PRIVATE, 1)  = 1

        write(1, "", 0)          = 0

        futex(0xb57898, FUTEX_WAKE_PRIVATE, 1)  = 1

 futex(0xb57798, FUTEX_WAKE_PRIVATE, 1)  = 1

              read(0, "*", 256)        = 1

       futex(0xb57898, FUTEX_WAKE_PRIVATE, 1)  = 1

     futex(0xb57798, FUTEX_WAKE_PRIVATE, 1)  = 1

             write(1, "", 0)          = 0

    futex(0xb57898, FUTEX_WAKE_PRIVATE, 1)  = 1

    futex(0xb57798, FUTEX_WAKE_PRIVATE, 1)  = 1

          read(0, "*", 256)        = 1

          futex(0xb57898, FUTEX_WAKE_PRIVATE, 1)  = 1

 futex(0xb57798, FUTEX_WAKE_PRIVATE, 1)  = 1

 write(1, "", 0)          = 0

       futex(0xb57898, FUTEX_WAKE_PRIVATE, 1)  = 1

       futex(0xb57798, FUTEX_WAKE_PRIVATE, 1)  = 1

read(0, "*", 256)        = 1

            futex(0xb57898, FUTEX_WAKE_PRIVATE, 1)  = 1

     futex(0xb57798, FUTEX_WAKE_PRIVATE, 1)  = 1

   write(1, "", 0)          = 0

           read(0, "(", 256)        = 1

  futex(0xb57898, FUTEX_WAKE_PRIVATE, 1)  = 1

  futex(0xb57798, FUTEX_WAKE_PRIVATE, 1)  = 1

        --- SIGURG {si_signo=SIGURG, si_code=SI_TKILL, si_pid=13264, si_uid=0} ---

  rt_sigreturn({mask=[]})  = 0

  --- SIGURG {si_signo=SIGURG, si_code=SI_TKILL, si_pid=13264, si_uid=0} ---

           rt_sigreturn({mask=[]})  = 0

  --- SIGURG {si_signo=SIGURG, si_code=SI_TKILL, si_pid=13264, si_uid=0} ---

   rt_sigreturn({mask=[]})  = 0

           --- SIGURG {si_signo=SIGURG, si_code=SI_TKILL, si_pid=13264, si_uid=0} ---

     rt_sigreturn({mask=[]})  = 0

   --- SIGURG {si_signo=SIGURG, si_code=SI_TKILL, si_pid=13264, si_uid=0} ---

            rt_sigreturn({mask=[]})  = 0

     --- SIGURG {si_signo=SIGURG, si_code=SI_TKILL, si_pid=13264, si_uid=0} ---

rt_sigreturn({mask=[]})  = 0

            --- SIGURG {si_signo=SIGURG, si_code=SI_TKILL, si_pid=13264, si_uid=0} ---

      rt_sigreturn({mask=[]})  = 0

--- SIGURG {si_signo=SIGURG, si_code=SI_TKILL, si_pid=13264, si_uid=0} ---

      rt_sigreturn({mask=[]})  = 0

      write(1, "", 0)          = 0

read(0, "\r", 256)       = 1

            futex(0xb57898, FUTEX_WAKE_PRIVATE, 1)  = 1

     futex(0xb57798, FUTEX_WAKE_PRIVATE, 1)  = 1

   write(1, "\r\n", 2)      = ? ERESTARTSYS (To be restarted if SA_RESTART is set)

          --- SIGURG {si_signo=SIGURG, si_code=SI_TKILL, si_pid=13264, si_uid=0} ---

    rt_sigreturn({mask=[]})  = 1

    write(1, "\r\n", 2

)      = 2

          openat(AT_FDCWD, "/etc/zextras/service-discover/cluster-credentials.tar.gpg", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)

  openat(AT_FDCWD, "/opt/zextras/conf/localconfig.xml", O_RDONLY|O_CLOEXEC) = 3

epoll_ctl(4, EPOLL_CTL_ADD, 3, {EPOLLIN|EPOLLOUT|EPOLLRDHUP|EPOLLET, {u32=2356374040, u64=140430607084056}}) = -1 EPERM (Operation not permitted)

            epoll_ctl(4, EPOLL_CTL_DEL, 3, 0xc00011f09c) = -1 EPERM (Operation not permitted)

             fstat(3, {st_mode=S_IFREG|0640, st_size=6245, ...}) = 0

          read(3, "<?xml version=\"1.0\" encoding=\"UT"..., 6246) = 6245

       read(3, "", 1)           = 0

             close(3)  = 0

             mmap(NULL, 262144, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7fb88c582000

         futex(0xc000080150, FUTEX_WAKE_PRIVATE, 1) = 1

     futex(0xc000100150, FUTEX_WAKE_PRIVATE, 1) = 1

      futex(0xb57d30, FUTEX_WAIT_PRIVATE, 0, NULL) = 0

    futex(0xb57d30, FUTEX_WAIT_PRIVATE, 0, NULL) = 0

futex(0xb57d30, FUTEX_WAIT_PRIVATE, 0, NULL) = 0

     futex(0xb57d30, FUTEX_WAIT_PRIVATE, 0, NULL) = 0

   epoll_pwait(4, [], 128, 0, NULL, 1)     = 0

 futex(0xb57d30, FUTEX_WAIT_PRIVATE, 0, NULL) = -1 EAGAIN (Resource temporarily unavailable)

     epoll_pwait(4, [], 128, 0, NULL, 140735358155048) = 0

futex(0xb57d30, FUTEX_WAIT_PRIVATE, 0, NULLpanic: runtime error: invalid memory address or nil pointer dereference [recovered]

panic: runtime error: invalid memory address or nil pointer dereference

[signal SIGSEGV: segmentation violation code=0x1 addr=0x50 pc=0x6dfe01]



goroutine 1 [running]:

github.com/alecthomas/kong.catch(0xc00021fa58)

/home/agent/go/pkg/mod/github.com/alecthomas/kong@v0.2.15/kong.go:366 +0xc5

panic(0x8270e0, 0xb46680)

/usr/lib/go/src/runtime/panic.go:965 +0x1b9

github.com/go-ldap/ldap/v3.(*Conn).nextMessageID(...)

/home/agent/go/pkg/mod/github.com/go-ldap/ldap/v3@v3.2.4/conn.go:282

github.com/go-ldap/ldap/v3.(*Conn).doRequest(0x0, 0x915fe0, 0xc000239b00, 0x40, 0x40, 0x85dbe0)

/home/agent/go/pkg/mod/github.com/go-ldap/ldap/v3@v3.2.4/request.go:26 +0x61

github.com/go-ldap/ldap/v3.(*Conn).SimpleBind(0x0, 0xc000239b00, 0x0, 0x0, 0x0)

/home/agent/go/pkg/mod/github.com/go-ldap/ldap/v3@v3.2.4/bind.go:65 +0x99

github.com/go-ldap/ldap/v3.(*Conn).Bind(0x0, 0xc00002c7c0, 0x1e, 0xc000024ad5, 0x9, 0xc000075110, 0x1)

/home/agent/go/pkg/mod/github.com/go-ldap/ldap/v3@v3.2.4/bind.go:104 +0x85

bitbucket.org/zextras/service-discover/cli/lib/zimbra.connect(0xc000068420, 0x0, 0xc00002c7c0, 0x1e, 0xc000024ad5, 0x9)

/tmp/cli/lib/zimbra/ldap.go:139 +0x1be

bitbucket.org/zextras/service-discover/cli/lib/zimbra.(*ldapContext).QueryAllServersWithService(0xc000068420, 0x899b62, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0)

/tmp/cli/lib/zimbra/ldap.go:73 +0x74

bitbucket.org/zextras/service-discover/cli/server/command/setup.(*Setup).isFirstInstance(0xc000147680, 0x91fce0, 0xc000119810, 0x0, 0x0, 0x91d598)

/tmp/cli/server/command/setup/common.go:186 +0x1cb

bitbucket.org/zextras/service-discover/cli/server/command/setup.(*Wizard).Run(0xc00019c0a8, 0xc00019c000, 0x0, 0x0)

/tmp/cli/server/command/setup/wizard.go:62 +0x377

reflect.Value.call(0x81b460, 0xc00019c0a8, 0x213, 0x89177d, 0x4, 0xc000130cf0, 0x1, 0x1, 0x1, 0x0, ...)

/usr/lib/go/src/reflect/value.go:476 +0x8e7

reflect.Value.Call(0x81b460, 0xc00019c0a8, 0x213, 0xc000130cf0, 0x1, 0x1, 0x0, 0x1, 0xc0001d58b8)

/usr/lib/go/src/reflect/value.go:337 +0xb9

github.com/alecthomas/kong.callMethod(0x891384, 0x3, 0x85c320, 0xc00019c0a8, 0x199, 0x81b460, 0xc00019c0a8, 0x213, 0xc0001d75f0, 0x0, ...)

/home/agent/go/pkg/mod/github.com/alecthomas/kong@v0.2.15/callbacks.go:71 +0x4ba

github.com/alecthomas/kong.(*Context).RunNode(0xc0001d2000, 0xc0001a21c0, 0xc00011fab0, 0x1, 0x1, 0xc00019c0a8, 0x85c320)

/home/agent/go/pkg/mod/github.com/alecthomas/kong@v0.2.15/context.go:697 +0x545

github.com/alecthomas/kong.(*Context).Run(0xc0001d2000, 0xc00011fab0, 0x1, 0x1, 0x0, 0x0)

/home/agent/go/pkg/mod/github.com/alecthomas/kong@v0.2.15/context.go:714 +0x99

main.main()

/tmp/cli/server/server.go:59 +0x891

) = ?

+++ exited with 2 +++

root@carbonio:/home/yaroslav# 

ReplyQuote
yaroslav
(@yaroslav)
Joined: 4 months ago
Posts: 6
Topic starter  

@arman could you please point me to fix this error?
I'm using ubuntu minimal 20.04 certified cloud image.


ReplyQuote
yaroslav
(@yaroslav)
Joined: 4 months ago
Posts: 6
Topic starter  

Root cause was in OS image.

After installing a regular ubuntu server from iso I was able to run all steps from docs.

 


ReplyQuote
Arman Khosravi
(@arman)
Admin
Joined: 1 year ago
Posts: 179
 
Posted by: @yaroslav

Root cause was in OS image.

After installing a regular ubuntu server from iso I was able to run all steps from docs.

 

Hi yaroslav,

Would you please let me know where you obtained the wrong Ubuntu minimal 20.04 image so I can regenerate the error? 

Thank you very much.

This post was modified 3 months ago by Arman Khosravi

ReplyQuote
yaroslav
(@yaroslav)
Joined: 4 months ago
Posts: 6
Topic starter  

@arman here


ReplyQuote
Arman Khosravi
(@arman)
Admin
Joined: 1 year ago
Posts: 179
 

@yaroslav

Thanks a lot for the link.

____________________________________________________________________________________


ReplyQuote
nitram
(@nitram)
Joined: 5 months ago
Posts: 22
 

Hello, i seem to be getting a similar error on my end too.

 

root@mail:~# service-discover setup $(hostname -i) --password=my_password
panic: runtime error: invalid memory address or nil pointer dereference [recovered]
panic: runtime error: invalid memory address or nil pointer dereference
[signal SIGSEGV: segmentation violation code=0x1 addr=0x50 pc=0x6dfe01]

 

i got that error at first, then the installation proceeded. and finally.

insert the cluster credential password: service-discover: error: unable to open /etc/zextras/service-discover/cluster-credentials.tar.gpg: cannot find Cluster credential in /etc/zextras/service-discover/cluster-credentials.tar.gpg, please copy the file from the existing server
cannot access to bootstrap token

 

thats is the other error i got installation done at hetzner cloud

This post was modified 2 months ago by nitram

ReplyQuote
nek4h
(@nek4h)
Joined: 2 months ago
Posts: 1
 

Hello, I have the same error:

You have 6 pending setups
insert the cluster credential password:

 

how can I set the cluster credential password?

 

Thanks


ReplyQuote
Niktator
(@niktator)
Joined: 1 month ago
Posts: 1
 
Posted by: @nek4h

Hello, I have the same error:

You have 6 pending setups
insert the cluster credential password:

 

how can I set the cluster credential password?

 

Thanks

I got the same question. I installed everything like its adviced in the docs - but I can`t find any hints how to set a password or create the cluster-credentials.tar.gpg since i dont have an existing server 😉


ReplyQuote
Sanket Gawas
(@sanket-gawas)
Joined: 12 months ago
Posts: 3
 

Hello,

To set a cluster password, please go through the Carbonio article https://docs.zextras.com/carbonio-ce/html/_management/mesh.html#mesh-install  


ReplyQuote