/srv/irclogs.ubuntu.com/2018/08/01/#ubuntu-devel.txt

=== RAOF[m] is now known as RAOF
=== william is now known as g2
tjaaltonahasenack: done04:29
=== robink is now known as Guest65857
dupondjehttps://bugs.launchpad.net/ubuntu/+source/freerdp2/+bug/176481907:12
ubottuLaunchpad bug 1764819 in freerdp2 (Ubuntu) "CredSSP v6 on Bionic not supported freerdp2" [Undecided,New]07:12
dupondjeMight be something important to fix? The more people upgrade their windows server, the more people will have issues with freerdp connecting to it ...07:12
dupondjedon't know who would be the best to guy to get this fixed :)07:23
dupondjeGuess we don't want to take the cosmic version for bionic? (which is the best option I guess)07:23
=== _hc is now known as Guest87130
=== Guest87130 is now known as _hc
seb128doko, hey, you didn't reply yesterday about the new theme ... do you think it's possible to have a pre-ack so we can start shipping it? knowing we are the maintainer and commit to fixing issues raised by the review if there is any?08:29
rbasakbdmurray: SRU reviewing xfce4-terminal in the Bionic queue, I'm not sure what to do about the translation and build system noise. Is that OK?10:07
infinityrbasak: It's expected for a new upstream.10:46
smbmvo, you might be interested in https://bugs.launchpad.net/ubuntu/+source/snapd/+bug/178484312:22
ubottuLaunchpad bug 1784843 in snapd (Ubuntu) "snap list: unexpected fault address 0xfffff1f0" [Undecided,New]12:22
coreycbdoko: is python3.7-dbg up to speed with debug symbols? i'm getting a coredump but can't make much sense of it.12:43
coreycbdoko: nm user error i think12:45
=== Eleventh_Doctor is now known as Pharaoh_Atem
=== inaddy is now known as tinoco
mvosmb: thank you, looking!12:57
coreycbdoko: i may need a hand with this: https://bugs.launchpad.net/ubuntu/+source/python3.7/+bug/178485413:25
ubottuLaunchpad bug 1784854 in python3.7 (Ubuntu) "segfault in _abc__abc_instancecheck_impl at ../Modules/_abc.c:521" [Undecided,New]13:25
smosercjwatson_ or bdmurray i'd appreciate review of https://code.launchpad.net/~smoser/software-properties/trunk.lp1667725-https-signing-key/+merge/351824 . It seems to me to be a general improvement.14:40
smbmvo, It appears this was just an unfortunate flipping of bits at some point. I did mark my bug as invalid15:40
mvosmb: thanks for the update! interesstinng15:54
mvosmb: if you still have the sd card a hash of the snapd binary and snap binary might be interessting to see if the binary on disk got corrupted15:55
smbmvo, though I have the SD card the first step I tried was a re-install of the dpkg, so that is gone15:56
mvosmb: ok, no worries. your conclusion sounds right15:57
smbmvo, After finding that I remembered dpkg --verify and found that a few more things were affected. But all of those much less obvious or likely to notice. I need to make a note to remember doing that next time16:01
=== tyhicks is now known as Guest67790
xnoxLaney, what is the backing store for lxd for the armhf-on-arm64 runners? i'm trying to reproduce17:14
xnoxcompat_uts_machine=armv7l17:14
xnoxbah17:14
xnoxUnable to read extent map for '/usr/lib/systemd/tests/test-sleep': Inappropriate ioctl for device17:14
xnoxAssertion 'test_fiemap(argv[0]) == 0' failed at ../src/test/test-sleep.c:94, function main(). Aborting.17:14
xnoxbut failing to do so, on an arm64 bare-metal instance, with lxd container.17:14
xnoxso wondering what is the "backing" store for the containers on the production machines.... dir? btrfs?17:15
xnoxLaney, managed to reproduce =)17:30
xnoxwin17:30
xnoxwith btrfs backend17:30
=== alan_g is now known as alan_g|EOD
slangasekstgraber: hi, so for LP: #1302192, you several years ago marked ping setuid because "there's currently no good ways to have capabilities be kept in all our images".  Is this still a concern?  This comes up because a customer has noticed /usr/bin/mtr-packet also has fscaps configured.  Should we still not be able to rely on xattr support on all our rootfs types?19:23
ubottuLaunchpad bug 1302192 in iputils (Ubuntu Trusty) "capabilities not preserved on installation" [Undecided,Confirmed] https://launchpad.net/bugs/130219219:23
stgraberslangasek: so it mostly depends on how much we care about tarballs and backward compat of squashfs19:28
slangasekstgraber: GNU tar has a --xattrs option now19:28
stgraberslangasek: recent squashfs implementations do support xattrs I believe, so as long as our build systems aren't running ancient versions of squashfs-tools that should be fine19:29
slangasekstgraber: I do see that in the existing pipeline, a newly-launched lxd container ends up without the fscaps but I haven't looked into it19:29
slangasekstgraber: I guess my question is, if I fix that, do you know of any reasons we shouldn't just require fscaps support as a baseline, and revert the iputils diff?19:29
stgraberslangasek: right but from what I remember about tarballs, it's an extension which redhat made a while back which isn't strictly compatible with the tar format, so some unpackers may crash19:29
slangasekstgraber: fair; otoh I don't think we distribute our rootfs as tarball anywhere except to a particular cloud partner?19:30
stgraberslangasek: LP build chroots are tarballs and we publish a -root.tar.xz for all cloud images on cloud-images.u.c19:31
stgraberslangasek: the ubuntu-base image on cdimage/releases is also a tarball19:31
stgraberah, base and possibly LP chroots may be fine as they likely don't contain iputils19:33
stgraberlooking into tar xattr, looks like the issue is incompatible format for xattrs between GNU tar and libarchive19:34
slangasekstgraber: and certainly, "fails to restore xattrs on unpack with certain unpackers" is a lesser bug than "fails to unpack with certain unpackers"19:37
stgraberslangasek: indeed, loosing the xattr is probably acceptable19:37
stgraberslangasek: I wish xattrs were better tracked in .deb packages though, if we had a .xattr file under /var/lib/dpkg/info/, we could trivially write a tool (cloud-init hook?) that could re-apply them all on startup, or if that fails, make all affected files setuid.19:38
slangasekstgraber: the root.tar.xz on c-i.u.c, we thought we were dropping, then we had a downstream requirement to bring it back (so it's present again in cosmic).  And it contains mtr-tiny, so is currently affected by this bug, which we either fix by adding xattrs to the tarball or by hacking mtr to not use xattrs (which would be less secure)19:39
stgraberslangasek: ok, anyway, I'm not opposed to having that delta be dropped, but this needs to be done carefuly, needs to be documented in the 18.10 announcement and we should expect a good pile of bugs as a result of it because people tend to like using tarballs/rsync with their systems and are unlikely to be passing --xattr to both of those right now.19:42
slangasekstgraber: ok, I think I'm going to post to ubuntu-devel and propose that we standardize on xattrs: yes19:42
stgraberAFAICT unsquashfs extracts xattrs by default, so that one should be fine19:43
slangasekrcj: ^^ fyi19:46
rcjslangasek: thank you19:53
stgraberslangasek: https://github.com/lxc/lxd/pull/4861 <- LXD side of this19:55
slangasekstgraber: is that sufficient to fix the fscaps on /usr/bin/mtr-packet?  i.e. the squashfs we're producing is already correct?19:56
stgraberslangasek: that only changes handling of tarballs and rsync, squashfs is supposedly unpacking xattrs by default which would suggest that your squashfs is bad?19:57
slangasekok19:57
stgraberthen again, mksquashfs says that it stores xattrs by default19:57
slangasekyeah, I will investigate19:57
stgraberhow's the squashfs generated? is it directly coming off the build directory or is that getting repacked somewhere that might go through one of tar, rsync or a fs that's not capable of storing xattrs (or uses fakeroot/fakechroot which I suspect also may not know what an xattr is)19:58
slangasekit's generated by livecd-rootfs, it ought to be straight from the build dir without any intermediate tar streaming. But I'll dig19:58
stgraberand that's running as real root?19:59
slangasek# mount /var/lib/lxd/images/90203fd4cf8732375207ecbde3a1672466dbbfd72a12e39469db9ee6f51b0bbf.rootfs /mnt19:59
slangasek# getcap /mnt/usr/bin/mtr-packet19:59
slangasek/mnt/usr/bin/mtr-packet = cap_net_raw+ep19:59
stgraberoh, good, so the cap is there19:59
slangasekso the squashfs was good, but it's not visible within the container?19:59
stgraberwhat storage backend are you using?19:59
stgraberzfs has some restrictions on xattrs by default for example20:00
slangasekit's zfs20:00
stgraberslangasek: what does "zfs get xattr lxd/images" get you?20:01
slangasekNAME        PROPERTY  VALUE  SOURCE20:01
slangaseklxd/images  xattr     on     default20:01
stgraberok, I usually set that to "sa" to support a larger set of attributes but I don't know that it'd cause the attr to just be stripped20:02
stgraberI wonder if it's unsquashfs' manpage lying to us20:02
* stgraber tests20:02
stgraberoh, or maybe not...20:03
stgraberit may just be unpriv fscaps causing it20:03
stgraberlets see20:03
slangasekstgraber: I ran getcap on the mountpoint on the host also; it's not there20:03
slangasek$ getcap /var/lib/lxd/storage-pools/lxd/containers/caring-calf/rootfs/usr/bin/mtr-packet20:04
slangasek$20:04
stgraberok, so unsquashfs is the likely suspect then, unless LXD changing permissions caused the kernel to strip the attr which is plausible too20:04
stgraberyup, that's it, it's the uid/gid remapping that's stripping it...20:05
stgraberstgraber@castiana:~$ lxc launch ubuntu-daily:cosmic c2 -c security.privileged=true20:05
stgraberCreating c220:05
stgraberStarting c220:05
stgraberstgraber@castiana:~$ lxc exec c2 -- getcap /usr/bin/mtr-packet20:05
stgraber/usr/bin/mtr-packet = cap_net_raw+ep20:05
stgraberso that's gonna be fun to fix...20:05
slangasekheh20:06
slangasekstgraber: feasible fun or infeasible fun? :)20:06
slangasekif you can't fix it, that puts a damper on a proposal to allow fscaps in packages20:06
stgrabershould be feasible but I'd need to look into hallyn's work on unpriv fscaps20:07
stgraberI don'20:07
slangasekok20:07
stgraberI can't remember if we can just set it the normal way in the xattrs or if we need to store the namespaced key20:07
stgraberI suspect we want the namespaced key so that the container user can update the binary later on but that's a bit of a blur in my head now :)20:07
=== ilera is now known as Guest29709
slangasek       --xattrs-include=PATTERN21:26
slangasek              Specify the include pattern for xattr keys.  PATTERN is a  POSIX21:26
slangasek              regular expression.21:26
slangasekLIES21:26
mwhudsonis it an emacs regular expression?21:32
hallynwhzzup21:43
hallynslangasek: I'm probably misunderstanding, but it sounds like you're expanding a tarball with xattrs in a userns, then expecting to see those from the host;  you'll only see them as xattrs from within a userns which has the same host uid mapped to root21:47
slangasekhallyn: this is lxd doing the expanding, and it winds up with fscaps disappearing from the rootfs of an unprivileged container (when viewed from either inside or outside)22:02
=== jeblair is now known as Guest15681
sladen~22:21
rbasakinfinity: did you conclude if you want to accept the nodejs openssl ABI/soname link change?23:07
rbasakbug 177986323:07
ubottubug 1779863 in nodejs (Ubuntu Cosmic) "Ubuntu nodejs package isn't ABI compatible with mainline nodejs." [Medium,In progress] https://launchpad.net/bugs/177986323:07
ograhmm, anyone familiar with journald ? ... according to the journald.conf manpage the commented values in journald.conf are the defaults ...23:58
ograthere are no size limites set in that file which makes me assume there is no upper limit for the logs ...23:58
ograthe logs are stored in /run ... which in turn is a tmpfs we mount with a fixed size (10% of the RAM it seems)23:59
ograso that seems to be my upper limit for the logs ...23:59

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!