<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    Hello,
    <br>
    <br>
    I'm having difficulty to install clients by kickstart + pxe on
    spacewalk.
    <br>
    My spacewalk clients (including the server) are virtualizated on xen
    server (citrix). Well, I think my kickstart probally is wrong.
    <br>
    <br>
    I don't have DHCP on my server environment, so I'm put static IP on
    the kickstart file. The DVD is mounted on /var/lib/satellite/centos5
    and I trying make the installation over HTTP connection. When I
    start the VM to install by spacewalk, when the linux going to
    install the packages, I get the error saying that the RedHat-log.rpm
    couldn't be opened or read and the package could be corrupted. I
    compared the md5sum of DVD and it's be fine.
    <br>
    <br>
    Somebody have some idea ?
    <br>
    <br>
    []'s
    <br>
    Renato
    <br>
    <br>
    Here is my kickstart configuration:
    <br>
    <br>
    <br>
    # Kickstart config file generated by Spacewalk Config Management
    <br>
    # Profile Label : ks-centos5
    <br>
    # Date Created  : 2011-11-30 16:43:42.119744
    <br>
    <br>
    install
    <br>
    text
    <br>
    network --device=eth0 --bootproto=static --ip=10.0.2.243
    --netmask=255.255.0.0 --gateway=10.0.2.6 --dns=10.0.2.6
    <br>
    url --url <a class="moz-txt-link-freetext"
      href="http://spacewalk.human/ks/dist/Centos5">http://spacewalk.human/ks/dist/Centos5</a>
    <br>
    lang en_US
    <br>
    keyboard us
    <br>
    zerombr
    <br>
    clearpart --all
    <br>
    bootloader --location mbr --driveorder=xvda --append=
    <br>
    timezone America/New_York
    <br>
    auth --enablemd5 --enableshadow
    <br>
    rootpw --iscrypted $1$eP5lko9H$XqUg41dICP.yEbvJq9Zz1/
    <br>
    selinux --disabled
    <br>
    reboot
    <br>
    firewall --disabled
    <br>
    skipx
    <br>
    key --skip
    <br>
    part /boot --fstype ext3 --size=100 --ondisk=xvda
    <br>
    part pv.00 --size=0 --grow --ondisk=xvda
    <br>
    volgroup VolGroup00 --pesize=32768 pv.00
    <br>
    logvol / --fstype ext3 --name=LogVol00 --vgname=VolGroup00
    --size=1024 --grow
    <br>
    logvol swap --fstype swap --name=LogVol01 --vgname=VolGroup00
    --size=272 --grow --maxsize=544
    <br>
    <br>
    %packages
    <br>
    @ Base
    <br>
    <br>
    %pre
    <br>
    wget <a class="moz-txt-link-rfc2396E"
href="http://spacewalk.human/cblr/svc/op/trig/mode/pre/profile/ks-centos5:1:SpacewalkDefaultOrganization">"http://spacewalk.human/cblr/svc/op/trig/mode/pre/profile/ks-centos5:1:SpacewalkDefaultOrganization"</a>
    -O /dev/null
    <br>
    <br>
    echo "Saving RHN keys..." > /dev/ttyS0
    <br>
    SYSTEM_ID=/etc/sysconfig/rhn/systemid
    <br>
    rhn_keys_found=no
    <br>
    <br>
    mkdir -p /tmp/rhn
    <br>
    <br>
    drives=$(list-harddrives | awk '{print $1}')
    <br>
    for disk in $drives; do
    <br>
        DISKS="$DISKS $(fdisk -l <i class="moz-txt-slash"><span
        class="moz-txt-tag">/</span>dev<span class="moz-txt-tag">/</span></i>$disk
    | grep -v "swap\|LVM\|Extended" | awk '/^\<i class="moz-txt-slash"><span
        class="moz-txt-tag">/</span>dev<span class="moz-txt-tag">/</span></i>{print
    $1}')"
    <br>
    done
    <br>
    <br>
    # Try to find the keys on ordinary partitions
    <br>
    for disk in $DISKS; do
    <br>
        name=test-$(basename $disk)
    <br>
        mkdir -p <i class="moz-txt-slash"><span class="moz-txt-tag">/</span>tmp<span
        class="moz-txt-tag">/</span></i>$name
    <br>
        mount $disk <i class="moz-txt-slash"><span class="moz-txt-tag">/</span>tmp<span
        class="moz-txt-tag">/</span></i>$name
    <br>
        [ $? -eq 0 ] || continue # Skip to the next partition if the
    mount fails
    <br>
    <br>
        # Copy current RHN host keys out to be reused
    <br>
        if [ -f <i class="moz-txt-slash"><span class="moz-txt-tag">/</span>tmp<span
        class="moz-txt-tag">/</span></i>${name}$SYSTEM_ID ]; then
    <br>
            cp -a <i class="moz-txt-slash"><span class="moz-txt-tag">/</span>tmp<span
        class="moz-txt-tag">/</span></i>${name}$SYSTEM_ID /tmp/rhn
    <br>
            rhn_keys_found="yes"
    <br>
            umount <i class="moz-txt-slash"><span class="moz-txt-tag">/</span>tmp<span
        class="moz-txt-tag">/</span></i>$name
    <br>
            break
    <br>
        fi
    <br>
        umount <i class="moz-txt-slash"><span class="moz-txt-tag">/</span>tmp<span
        class="moz-txt-tag">/</span></i>$name
    <br>
        rm -r <i class="moz-txt-slash"><span class="moz-txt-tag">/</span>tmp<span
        class="moz-txt-tag">/</span></i>$name
    <br>
    done
    <br>
    <br>
    # Try LVM if that didn't work
    <br>
    if [ "$rhn_keys_found" = "no" ]; then
    <br>
        lvm lvmdiskscan
    <br>
        vgs=$(lvm vgs | tail -n +2 | awk '{ print $1 }')
    <br>
        for vg in $vgs; do
    <br>
            # Activate any VG we found
    <br>
            lvm vgchange -ay $vg
    <br>
        done
    <br>
    <br>
        lvs=$(lvm lvs | tail -n +2 | awk '{ print "<i
      class="moz-txt-slash"><span class="moz-txt-tag">/</span>dev<span
        class="moz-txt-tag">/</span></i>" $2 "/" $1 }')
    <br>
        for lv in $lvs; do
    <br>
            tmpdir=$(mktemp -d findkeys.XXXXXX)
    <br>
            mkdir -p <i class="moz-txt-slash"><span class="moz-txt-tag">/</span>tmp<span
        class="moz-txt-tag">/</span></i>${tmpdir}
    <br>
            mount $lv <i class="moz-txt-slash"><span
        class="moz-txt-tag">/</span>tmp<span class="moz-txt-tag">/</span></i>${tmpdir}
    || continue # Skip to next volume if this fails
    <br>
    <br>
            # Let's see if the keys are in there
    <br>
            if [ -f <i class="moz-txt-slash"><span class="moz-txt-tag">/</span>tmp<span
        class="moz-txt-tag">/</span></i>${tmpdir}$SYSTEM_ID ]; then
    <br>
                cp -a <i class="moz-txt-slash"><span
        class="moz-txt-tag">/</span>tmp<span class="moz-txt-tag">/</span></i>${tmpdir}$SYSTEM_ID
    <i class="moz-txt-slash"><span class="moz-txt-tag">/</span>tmp/rhn<span
        class="moz-txt-tag">/</span></i>
    <br>
                rhn_keys_found="yes"
    <br>
                umount <i class="moz-txt-slash"><span
        class="moz-txt-tag">/</span>tmp<span class="moz-txt-tag">/</span></i>${tmpdir}
    <br>
                break # We're done!
    <br>
            fi
    <br>
            umount <i class="moz-txt-slash"><span class="moz-txt-tag">/</span>tmp<span
        class="moz-txt-tag">/</span></i>${tmpdir}
    <br>
            rm -r <i class="moz-txt-slash"><span class="moz-txt-tag">/</span>tmp<span
        class="moz-txt-tag">/</span></i>${tmpdir}
    <br>
        done
    <br>
    <br>
        # And clean up..
    <br>
        for vg in $vgs; do
    <br>
            lvm vgchange -an $vg
    <br>
        done
    <br>
    fi
    <br>
    <br>
    %post --nochroot
    <br>
    mkdir /mnt/sysimage/tmp/ks-tree-copy
    <br>
    if [ -d /oldtmp/ks-tree-shadow ]; then
    <br>
    cp -fa <i class="moz-txt-slash"><span class="moz-txt-tag">/</span>oldtmp/ks-tree-shadow<span
        class="moz-txt-tag">/</span></i>* /mnt/sysimage/tmp/ks-tree-copy
    <br>
    elif [ -d /tmp/ks-tree-shadow ]; then
    <br>
    cp -fa <i class="moz-txt-slash"><span class="moz-txt-tag">/</span>tmp/ks-tree-shadow<span
        class="moz-txt-tag">/</span></i>* /mnt/sysimage/tmp/ks-tree-copy
    <br>
    fi
    <br>
    cp /etc/resolv.conf /mnt/sysimage/etc/resolv.conf
    <br>
    cp -f <i class="moz-txt-slash"><span class="moz-txt-tag">/</span>tmp/ks-pre.log*
      /mnt/sysimage/root<span class="moz-txt-tag">/</span></i>
    <br>
    <br>
    %post --nochroot --interpreter /usr/bin/python
    <br>
        try:
    <br>
        import xmlrpclib
    <br>
        import shutil
    <br>
        import os
    <br>
        import os.path
    <br>
        old_system_id = "/tmp/rhn/systemid"
    <br>
        new_system_id = "/mnt/sysimage/root/systemid.old"
    <br>
    <br>
        new_keys = "1-f426159c8f411ad58003717076663b3e"
    <br>
        for key in new_keys.split(','):
    <br>
            if key.startswith('re-'):
    <br>
                os.exit(0)
    <br>
        if os.path.exists(old_system_id):
    <br>
            client =  xmlrpclib.Server(<a class="moz-txt-link-rfc2396E"
      href="http://spacewalk.human/rpc/api">"http://spacewalk.human/rpc/api"</a>)
    <br>
            key =
    client.system.obtain_reactivation_key(open(old_system_id).read())
    <br>
            f = open("/mnt/sysimage/tmp/key","w")
    <br>
            f.write(key)
    <br>
            f.close()
    <br>
            shutil.copy(old_system_id, new_system_id)
    <br>
    except:
    <br>
        # xml rpc due to  a old/bad system id
    <br>
        # we don't care about those
    <br>
        # we'll register those as new.
    <br>
        pass
    <br>
    <br>
    %post --logfile /root/ks-rhn-post.log
    <br>
    # --Begin Spacewalk command section--
    <br>
    cat > /tmp/ssl-key-1 <<'EOF'
    <br>
    Certificate:
    <br>
        Data:
    <br>
            Version: 3 (0x2)
    <br>
            Serial Number:
    <br>
                cb:9f:14:64:b6:70:9c:27
    <br>
            Signature Algorithm: sha1WithRSAEncryption
    <br>
            Issuer: C=BR, ST=Rio Grande do Sul, L=Porto Alegre, O=Human
    Mobile, OU=spacewalk.human, CN=spacewalk.human
    <br>
            Validity
    <br>
                Not Before: Nov 28 13:00:44 2011 GMT
    <br>
                Not After : Nov 21 13:00:44 2036 GMT
    <br>
            Subject: C=BR, ST=Rio Grande do Sul, L=Porto Alegre, O=Human
    Mobile, OU=spacewalk.human, CN=spacewalk.human
    <br>
            Subject Public Key Info:
    <br>
                Public Key Algorithm: rsaEncryption
    <br>
                RSA Public Key: (2048 bit)
    <br>
                    Modulus (2048 bit):
    <br>
                        00:e8:bf:25:eb:6d:cf:5e:79:6d:ad:7b:09:e1:37:
    <br>
                        1b:87:fd:dc:b1:7e:0a:a2:ba:98:2b:5c:bc:c5:3f:
    <br>
                        71:6e:6e:24:41:a4:65:c8:92:d7:62:96:eb:5c:be:
    <br>
                        9b:1c:75:f9:c0:1e:82:95:c1:27:62:17:14:ef:63:
    <br>
                        2d:77:0b:88:4f:37:4f:ab:0e:7f:bc:55:98:42:17:
    <br>
                        7c:ca:23:78:79:f2:a4:b5:a3:c3:cc:c3:59:25:af:
    <br>
                        d7:3e:2c:a1:b1:2d:0a:cd:08:ef:de:4f:1e:b7:dd:
    <br>
                        89:80:db:26:35:6b:3a:b4:c0:32:28:00:aa:f9:a7:
    <br>
                        4f:68:72:e2:2c:9c:88:aa:5b:8d:e1:50:13:15:dc:
    <br>
                        a0:c6:b3:07:22:a4:70:4e:07:86:ae:f9:51:7d:79:
    <br>
                        05:de:b9:d6:c3:89:23:51:fe:22:f8:c3:1e:1f:8a:
    <br>
                        d8:c8:8c:ff:9c:d5:e3:dd:68:8d:e8:d7:34:3b:97:
    <br>
                        65:96:b2:63:92:16:6c:a6:e2:30:32:86:91:65:e2:
    <br>
                        d2:69:e0:e4:e6:3f:4a:02:a3:04:7b:12:a3:92:d4:
    <br>
                        9f:43:69:56:b8:89:4f:44:30:62:fe:16:94:ef:b1:
    <br>
                        c2:c8:39:f8:36:f2:c3:49:61:43:01:fe:7a:fe:11:
    <br>
                        5e:c9:2d:06:25:7f:93:59:9e:eb:69:ab:12:e0:03:
    <br>
                        61:2b
    <br>
                    Exponent: 65537 (0x10001)
    <br>
            X509v3 extensions:
    <br>
                X509v3 Basic Constraints:
    <br>
                    CA:TRUE
    <br>
                X509v3 Key Usage:
    <br>
                    Digital Signature, Key Encipherment, Certificate
    Sign
    <br>
                X509v3 Extended Key Usage:
    <br>
                    TLS Web Server Authentication, TLS Web Client
    Authentication
    <br>
                Netscape Comment:
    <br>
                    RHN SSL Tool Generated Certificate
    <br>
                X509v3 Subject Key Identifier:
    <br>
                   
    C0:5B:26:FD:DB:BF:9C:4E:F1:F4:CE:85:71:58:1F:1C:B2:5F:61:5C
    <br>
                X509v3 Authority Key Identifier:
    <br>
                   
    keyid:C0:5B:26:FD:DB:BF:9C:4E:F1:F4:CE:85:71:58:1F:1C:B2:5F:61:5C
    <br>
                    DirName:/C=BR/ST=Rio Grande do Sul/L=Porto
    Alegre/O=Human Mobile/OU=spacewalk.human/CN=spacewalk.human
    <br>
                    serial:CB:9F:14:64:B6:70:9C:27
    <br>
    <br>
        Signature Algorithm: sha1WithRSAEncryption
    <br>
            4e:64:be:96:3d:c5:09:8c:23:a5:fd:9c:0d:10:97:79:0b:ad:
    <br>
            1a:39:d0:b0:c3:37:f6:87:48:8f:08:19:eb:f1:77:d9:5e:c5:
    <br>
            74:4d:26:c4:3d:ce:c3:c9:d5:d8:98:a0:16:97:44:5b:9b:4f:
    <br>
            b4:28:fc:b5:26:88:c0:7a:e7:4e:b3:50:a2:8a:65:7a:55:8a:
    <br>
            b4:5d:d3:c2:f9:72:b9:cf:64:79:1e:22:9f:cc:36:84:c6:58:
    <br>
            76:7f:ef:93:b4:78:12:b3:7a:61:c7:19:32:5c:2d:4e:90:b0:
    <br>
            bc:6a:b0:82:0b:d9:ee:08:73:f6:65:b0:e6:8f:df:eb:2b:12:
    <br>
            7e:bc:99:9b:b1:e0:fa:64:15:7a:85:93:bb:68:c8:7b:bf:44:
    <br>
            0b:b2:b0:3c:18:d2:ab:0f:13:3d:25:fa:6d:38:95:ad:83:b3:
    <br>
            9b:db:0f:ba:a2:9b:b2:f1:9e:dd:23:f9:cd:92:a6:a6:65:78:
    <br>
            1b:e4:2e:55:c0:f1:55:93:d4:85:2e:91:1b:6c:2d:71:3c:51:
    <br>
            b0:da:d2:49:a1:21:59:de:b5:90:e9:17:32:38:de:ba:9d:5a:
    <br>
            09:65:63:aa:5d:cb:23:15:69:36:e6:0f:7f:86:e0:05:c6:20:
    <br>
            62:c4:00:04:2f:49:5e:7d:dc:e6:49:3c:c0:72:5b:6d:8f:f8:
    <br>
            f0:b4:92:7b
    <br>
    -----BEGIN CERTIFICATE-----
    <br>
    MIIE8DCCA9igAwIBAgIJAMufFGS2cJwnMA0GCSqGSIb3DQEBBQUAMIGLMQswCQYD
    <br>
    VQQGEwJCUjEaMBgGA1UECBMRUmlvIEdyYW5kZSBkbyBTdWwxFTATBgNVBAcTDFBv
    <br>
    cnRvIEFsZWdyZTEVMBMGA1UEChMMSHVtYW4gTW9iaWxlMRgwFgYDVQQLEw9zcGFj
    <br>
    ZXdhbGsuaHVtYW4xGDAWBgNVBAMTD3NwYWNld2Fsay5odW1hbjAeFw0xMTExMjgx
    <br>
    MzAwNDRaFw0zNjExMjExMzAwNDRaMIGLMQswCQYDVQQGEwJCUjEaMBgGA1UECBMR
    <br>
    UmlvIEdyYW5kZSBkbyBTdWwxFTATBgNVBAcTDFBvcnRvIEFsZWdyZTEVMBMGA1UE
    <br>
    ChMMSHVtYW4gTW9iaWxlMRgwFgYDVQQLEw9zcGFjZXdhbGsuaHVtYW4xGDAWBgNV
    <br>
    BAMTD3NwYWNld2Fsay5odW1hbjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC
    <br>
    ggEBAOi/Jettz155ba17CeE3G4f93LF+CqK6mCtcvMU/cW5uJEGkZciS12KW61y+
    <br>
    mxx1+cAegpXBJ2IXFO9jLXcLiE83T6sOf7xVmEIXfMojeHnypLWjw8zDWSWv1z4s
    <br>
    obEtCs0I795PHrfdiYDbJjVrOrTAMigAqvmnT2hy4iyciKpbjeFQExXcoMazByKk
    <br>
    cE4Hhq75UX15Bd651sOJI1H+IvjDHh+K2MiM/5zV491ojejXNDuXZZayY5IWbKbi
    <br>
    MDKGkWXi0mng5OY/SgKjBHsSo5LUn0NpVriJT0QwYv4WlO+xwsg5+Dbyw0lhQwH+
    <br>
    ev4RXsktBiV/k1me62mrEuADYSsCAwEAAaOCAVMwggFPMAwGA1UdEwQFMAMBAf8w
    <br>
    CwYDVR0PBAQDAgKkMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAxBglg
    <br>
    hkgBhvhCAQ0EJBYiUkhOIFNTTCBUb29sIEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAd
    <br>
    BgNVHQ4EFgQUwFsm/du/nE7x9M6FcVgfHLJfYVwwgcAGA1UdIwSBuDCBtYAUwFsm
    <br>
    /du/nE7x9M6FcVgfHLJfYVyhgZGkgY4wgYsxCzAJBgNVBAYTAkJSMRowGAYDVQQI
    <br>
    ExFSaW8gR3JhbmRlIGRvIFN1bDEVMBMGA1UEBxMMUG9ydG8gQWxlZ3JlMRUwEwYD
    <br>
    VQQKEwxIdW1hbiBNb2JpbGUxGDAWBgNVBAsTD3NwYWNld2Fsay5odW1hbjEYMBYG
    <br>
    A1UEAxMPc3BhY2V3YWxrLmh1bWFuggkAy58UZLZwnCcwDQYJKoZIhvcNAQEFBQAD
    <br>
    ggEBAE5kvpY9xQmMI6X9nA0Ql3kLrRo50LDDN/aHSI8IGevxd9lexXRNJsQ9zsPJ
    <br>
    1diYoBaXRFubT7Qo/LUmiMB6506zUKKKZXpVirRd08L5crnPZHkeIp/MNoTGWHZ/
    <br>
    75O0eBKzemHHGTJcLU6QsLxqsIIL2e4Ic/ZlsOaP3+srEn68mZux4PpkFXqFk7to
    <br>
    yHu/RAuysDwY0qsPEz0l+m04la2Ds5vbD7qim7Lxnt0j+c2SpqZleBvkLlXA8VWT
    <br>
    1IUukRtsLXE8UbDa0kmhIVnetZDpFzI43rqdWgllY6pdyyMVaTbmD3+G4AXGIGLE
    <br>
    AAQvSV593OZJPMByW22P+PC0kns=
    <br>
    -----END CERTIFICATE-----
    <br>
    <br>
    EOF
    <br>
    # ssl-key1
    <br>
    cat /tmp/ssl-key-* > /usr/share/rhn/RHN-ORG-TRUSTED-SSL-CERT
    <br>
    perl -npe 's/RHNS-CA-CERT/RHN-ORG-TRUSTED-SSL-CERT/g' -i <i
      class="moz-txt-slash"><span class="moz-txt-tag">/</span>etc/sysconfig/rhn<span
        class="moz-txt-tag">/</span></i>*
    <br>
    <br>
    mkdir -p /tmp/rhn_rpms/optional
    <br>
    cd /tmp/rhn_rpms/optional
    <br>
    wget -P /tmp/rhn_rpms/optional <a class="moz-txt-link-freetext"
href="http://spacewalk.human/download/package/8f5ff96d2851eed73ef3c84c41306690443f2754/0/1/3586/rhnlib-2.5.41-1.el5.noarch.rpm">http://spacewalk.human/download/package/8f5ff96d2851eed73ef3c84c41306690443f2754/0/1/3586/rhnlib-2.5.41-1.el5.noarch.rpm</a>
    <a class="moz-txt-link-freetext"
href="http://spacewalk.human/download/package/62366e925ffb7841435d1a3982f0faf74998ceb8/0/1/297/libxml2-python-2.6.26-2.1.12.x86_64.rpm">http://spacewalk.human/download/package/62366e925ffb7841435d1a3982f0faf74998ceb8/0/1/297/libxml2-python-2.6.26-2.1.12.x86_64.rpm</a>
    <a class="moz-txt-link-freetext"
href="http://spacewalk.human/download/package/b8aac5592d93126df04941191c0ca5533ab7f41e/0/1/3232/pyOpenSSL-0.6-2.el5.x86_64.rpm">http://spacewalk.human/download/package/b8aac5592d93126df04941191c0ca5533ab7f41e/0/1/3232/pyOpenSSL-0.6-2.el5.x86_64.rpm</a>
    <br>
    rpm -Uvh --replacepkgs --replacefiles
    /tmp/rhn_rpms/optional/pyOpenSSL* /tmp/rhn_rpms/optional/rhnlib*
    /tmp/rhn_rpms/optional/libxml2-python*
    <br>
    perl -npe
    's|^(\s*(noSSLS\|s)erverURL\s*=\s*[^:]+://)[^/]*/|${1}spacewalk.human/|'
    -i /etc/sysconfig/rhn/up2date
    <br>
    <br>
    # now copy from the ks-tree we saved in the non-chroot checkout
    <br>
    cp -fav <i class="moz-txt-slash"><span class="moz-txt-tag">/</span>tmp/ks-tree-copy<span
        class="moz-txt-tag">/</span></i>* /
    <br>
    rm -Rf /tmp/ks-tree-copy
    <br>
    # --End Spacewalk command section--
    <br>
    <br>
    /etc/init.d/messagebus restart
    <br>
    /etc/init.d/haldaemon restart
    <br>
    # begin cobbler snippet
    <br>
    # set default MOTD
    <br>
    echo "Kickstarted on $(date +'%Y-%m-%d')" >> /etc/motd
    <br>
    <br>
    # begin Red Hat management server registration
    <br>
    mkdir -p <i class="moz-txt-slash"><span class="moz-txt-tag">/</span>usr/share/rhn<span
        class="moz-txt-tag">/</span></i>
    <br>
    wget <a class="moz-txt-link-freetext"
      href="http://spacewalk.human/pub/RHN-ORG-TRUSTED-SSL-CERT">http://spacewalk.human/pub/RHN-ORG-TRUSTED-SSL-CERT</a>
    -O /usr/share/rhn/RHN-ORG-TRUSTED-SSL-CERT
    <br>
    perl -npe 's/RHNS-CA-CERT/RHN-ORG-TRUSTED-SSL-CERT/g' -i <i
      class="moz-txt-slash"><span class="moz-txt-tag">/</span>etc/sysconfig/rhn<span
        class="moz-txt-tag">/</span></i>*
    <br>
    key=""
    <br>
    if [ -f /tmp/key ]; then
    <br>
        key=`cat /tmp/key`
    <br>
    fi
    <br>
    <br>
    if [ $key ]; then
    <br>
        rhnreg_ks --serverUrl=<a class="moz-txt-link-freetext"
      href="https://spacewalk.human/XMLRPC">https://spacewalk.human/XMLRPC</a>
    --sslCACert=/usr/share/rhn/RHN-ORG-TRUSTED-SSL-CERT
    --activationkey=$key,1-f426159c8f411ad58003717076663b3e
    <br>
    else
    <br>
         rhnreg_ks --serverUrl=<a class="moz-txt-link-freetext"
      href="https://spacewalk.human/XMLRPC">https://spacewalk.human/XMLRPC</a>
    --sslCACert=/usr/share/rhn/RHN-ORG-TRUSTED-SSL-CERT
    --activationkey=1-f426159c8f411ad58003717076663b3e
    <br>
    fi
    <br>
    # end Red Hat management server registration
    <br>
    # end cobbler snippet
    <br>
    <br>
    rhn_check
    <br>
    <br>
    # Start post_install_network_config generated code
    <br>
    # End post_install_network_config generated code
    <br>
    <br>
    %post
    <br>
    # Start koan environment setup
    <br>
    echo "export COBBLER_SERVER=spacewalk.human" >
    /etc/profile.d/cobbler.sh
    <br>
    echo "setenv COBBLER_SERVER spacewalk.human" >
    /etc/profile.d/cobbler.csh
    <br>
    # End koan environment setup
    <br>
    <br>
    wget <a class="moz-txt-link-rfc2396E"
href="http://spacewalk.human/cblr/svc/op/ks/profile/ks-centos5:1:SpacewalkDefaultOrganization">"http://spacewalk.human/cblr/svc/op/ks/profile/ks-centos5:1:SpacewalkDefaultOrganization"</a>
    -O /root/cobbler.ks
    <br>
    wget <a class="moz-txt-link-rfc2396E"
href="http://spacewalk.human/cblr/svc/op/trig/mode/post/profile/ks-centos5:1:SpacewalkDefaultOrganization">"http://spacewalk.human/cblr/svc/op/trig/mode/post/profile/ks-centos5:1:SpacewalkDefaultOrganization"</a>
    -O /dev/null<br>
    <br>
    <br>
    []'s<br>
    Renato<br>
  </body>
</html>