Hey, we are trying to have Full disk encryption with ubuntu core 22 based custom image(have our own model/assertion see below). we have UEFI+TPM based amd64 device.
When we try to flash and boot with the image generated below, the model assertion, it fails to boot up our image only thing we can see is tty login screen, which our user(added through user assertion USB) is not valid anymore, so we can’t ssh in at all.
Any tips/tricks to debug?
type: model
authority-id: salto-device-platform
revision: 14
series: 16
brand-id: salto-device-platform
model: salto-intercom-panel-factory-dev
architecture: amd64
base: core22
grade: signed
snaps:
-
id: ...
name: ...
type: gadget
-
id: pYVQrBcKmBa0mZ4CCN7ExT6jH8rY1hza
name: pc-kernel
type: kernel
-
id: amcUKQILKXHHTlmSa7NMdnXSx02dNeeT
name: core22
type: base
-
id: PMrrV4ml8uWuEUDBT8dSGnKUYbevVhc4
name: snapd
type: snapd
-
id: ffnH0sJpX3NFAclH777M8BdXIWpo93af
name: landscape-client
type: app
-
id: UijXdFgvIKp9ZZ6P4ijPAJHWZLtSKgWm
name: mesa-core22
type: app
-
id: BPZbvWzvoMTrpec4goCXlckLe2IhfthK
name: ubuntu-frame
type: app
...
storage-safety: encrypted
store: ...
timestamp: 2024-09-27T12:23:20+00:00
validation-sets:
-
account-id: salto-device-platform
mode: prefer-enforce
name: ...
sequence: 14
sign-key-sha3-384: ...
...