<div dir="ltr"><div><div>I just spent a couple hours trying to figure this out so I thought I'd share.<br><br></div>I'm
using the stackforge puppet modules and writing my own integration
module to pull the individual modules together. That allows me to
integrate better with our current puppet methodology and with local
security policy. <br>
<br></div><div>One of the things we disallow, by accident actually, is
packages dropping their own sudo rules in /etc/sudoers.d. All sudo rules
must be explicitly specified and managed via puppet resources. As a
side effect of this when I went to start the nova metadata api on the
controller node my logs blew up (as did the inboxes of my coworkers)
with security violations from the nova metadata api attempting to use
the nova root wrapper via sudo. <br>
<br></div><div>I thought it a little odd that the nova metadata api
would need to do anything as root since I'm running the neutron metadata
agents which already run actions as root. I figured out that this was
coming from the nova.api.manager.MetadataManager class which I'm
pretty sure isn't needed for neutron. I changed the value of
metadata_manager in nova.conf to nova.manager.Manager and now the api
service no-longer needs the rootwrap sudo setup.<br>
<br></div>I couldn't find this documented anywhere, so hopefully this helps someone in the future.<div class=""><div id=":1k7" class="" tabindex="0"><img class="" src="https://mail.google.com/mail/u/0/images/cleardot.gif"><br>
</div><div id=":1k7" class="" tabindex="0">-Aaron<br></div></div></div>