/srv/irclogs.ubuntu.com/2018/08/09/#snappy.txt

=== amurray` is now known as amurray
mborzeckimorning05:06
=== chihchun_afk is now known as chihchun
mborzeckimvo: morning, i'm working with interfaces repo now, do you know if plug/slot ordering is of importance there?06:13
mvomborzecki: unfortunately I don't06:17
mvomborzecki: what are we currently doing?06:17
mborzeckimvo: the Slots()/Plugs() methods of repo do sorting by plug and snap name, with instance names looking like foo_bar the plugs/slots from instance snaps are always sorted after the regular ones06:18
mvomborzecki: aha, right. I think its fine but lets validate with zyga06:20
mborzeckimvo: ok06:20
mborzeckibtw. DeepEquals tends to blow up in those repo test when there's a mismatch06:21
mvomborzecki: blow up in what way?06:21
mvomborzecki: isn't the new diff stuff helping?06:21
mvomborzecki: or not good enough?06:21
mborzeckimvo: the test binary is oom killed06:21
mvomborzecki: woah06:21
mborzeckimvo: oh, maybe it's the diff06:21
mborzeckisie 09 08:09:15 corsair kernel: Out of memory: Kill process 27003 (interfaces.test) score 685 or sacrifice child06:23
mborzeckisie 09 08:09:15 corsair kernel: Killed process 27003 (interfaces.test) total-vm:8926256kB, anon-rss:8325200kB, file-rss:4kB, shmem-rss:5400kB06:23
zygaGood morning06:26
mborzeckizyga: hey, how's flock?06:27
zygamvo, mborzecki: how can I help?06:27
zygamborzecki: very interesting06:27
zygaI will write my day one report after breakfast06:27
mborzeckizyga: quick question, do you know whether the ordering of results in interface repo .Plugs()/Slots() method of impotance? with instances named foo_bar they get always sorted after non instance-keyed snaps06:28
zygaIt was just designed to be deterministic06:29
zygaIf you want to change that please look at how the results are used06:29
zygaSome code relies on this fact06:29
=== iliv_ is now known as iliv
* zyga uploads fedora29 snap again06:59
zyga(with some workarounds)06:59
zygaok, it just failed on type: base and some setuid root executables07:00
zygamvo: I'll neuter all the +s flags for now07:00
zygamvo: and re-upload07:00
zygawould you be OK acking the snap with just the type: base violation?07:01
mvozyga: ok07:04
mvozyga: sure, should be ifne07:04
=== chihchun is now known as chihchun_afk
zygamvo: https://dashboard.snapcraft.io/snaps/fedora29/revisions/3/07:11
zygamvo: I don't know how to request manual review otherwise07:11
mvozyga: its in07:12
zygaawesome, thank you!07:12
=== pstolowski|afk is now known as pstolowski
pstolowskimornings07:17
mborzeckipstolowski: heya07:19
sil2100mvo: hey! Can you upload the pi3 image somewhere for me to look at? Need to confirm something07:32
sil2100mvo: a fresh pi3 image at best07:32
sil2100(unconfigured yet)07:32
mvosil2100: sure, let me look at this07:41
zygamvo: hey,07:45
zygamvo_: can you please do a small test for me07:46
zygamvo_: would you mind trying the fedora29 snap (--edge) and then hello-fedora snap (stable) to see if it works on your system07:46
mvozyga: http://paste.ubuntu.com/p/97KmYZft6S/07:50
=== Fearful is now known as Guest30827
zygawoah, interesting07:50
mvosil2100: uploading07:50
zygathank you, I need to think about this now07:50
zygamvo: did you have any magic environment set up, LD_PRELOAD for instance?07:51
mvozyga: I'm not aware of any, there is a defualt LD_PRELOAD for some window decration stuff but that is harmless07:51
zygaaha07:52
Son_Gokuyay, the first time when we have incompatible ABI signatures :D07:52
zygathe path is interesting07:52
mvozyga: I think if you symlink /var/lib/snapd/snap to /snap in the fedora base things will work07:52
zygawhy: /var/lib/snapd/snap/hello-fedora/4/meta/snap.yaml07:52
mvozyga: because snap-exec detects its inside fedora07:52
mvozyga: and it expects the fedora layout07:52
Son_Gokumvo, that shouldn't be necessary, though?07:52
zygahmm07:53
mvozyga: thats my guess at least07:53
Son_Gokuzyga: mvo is actually correct07:53
* zyga explores07:53
Son_Gokuwe actually discovered this the first time I was working on this last year07:53
Son_Gokuthat's why mvo sent me a patch for my tool to actually add that07:53
mvoSon_Goku: I did? woah, I don't even remember07:53
Son_Gokuyeah07:53
zygaI'm not sure that's really the case yet07:54
Son_Gokuthe one and only time you've ever sent me a patch ;)07:54
mvo*cough*07:54
* mvo hugs Son_Goku 07:54
sil2100mvo: thank you!07:54
zygamvo: does snap run --shell hello-fedora also fail?07:54
Son_Gokumvo, this was all you: https://gitlab.com/Conan_Kudo/snapcore-mkrpmdistcoresnap/blob/master/mkrpmdistcoresnap#L122-132 ;)07:54
mvozyga: yes, in the same way07:54
zygaok, thank you07:54
* zyga tries something07:54
mvosil2100: please try http://people.canonical.com/~mvo/tmp/pi-kiosk.img07:55
zygait's a bug in snap-confine07:57
zygaI will work around it for now07:57
zygauh07:58
zyganot easy07:59
* zyga needs to think07:59
mborzeckizyga: isn't that the same thing that we had on amazon?08:06
mborzeckizyga: fwiw 'Hello Fedora!' here on arch08:10
mborzeckipstolowski: https://github.com/snapcore/snapd/pull/561408:14
pstolowskimborzecki: will do08:16
zygamborzecki: thank you :)08:17
zygamborzecki: I think there are issues when we mis-identify things in snap-confine08:17
zygamy preference is that all bases agree that /snap exists08:17
zyganot as a symlink08:17
zygaand snaps are mounted there08:17
zygaoh well08:18
zygaI need to move now, I'll check back soon08:18
mborzeckizyga: sounds like we could teach s-c a new trick08:19
zygaWhat is on your mind mborzecki ?08:32
mborzecki2018-08-09 09:04:40 Cannot allocate google:ubuntu-16.04-32: cannot perform Google request: Get https://www.googleapis.com/compute/v1/projects/computeengine/zones: oauth2: cannot fetch token: Post https://accounts.google.com/o/oauth2/token: net/http: TLS handshake timeout09:08
mvostgraber: hey, if you are around, is there a way to set "lxc.aa_profile=unconfinged" with lxd 3.0? trying my detection code currently and my machines are all bionic already11:10
=== Mikaela_ is now known as Mikaela
=== Mikaela_ is now known as Mikaela
mborzeckipstolowski: https://github.com/snapcore/snapd/pull/5616 ifacestate fix11:24
pstolowskilooking11:24
pstolowski+111:27
zygao/11:37
* Son_Goku waves11:38
mborzeckianother simple review https://github.com/snapcore/snapd/pull/5619 (cc pstolowski )11:57
pstolowskimborzecki: on it, does it pass all unit tests?11:59
mborzeckipstolowski: yes12:01
pstolowskiawesome12:01
pstolowskii was afarid we accidently relied on it somewhere :/12:01
mborzeckiheh, i hope not :)12:02
=== pstolowski is now known as pstolowski|lunch
zygamborzecki: hey12:25
mborzeckizyga: hm?12:26
zygaI have a patch coming up, just fighting github auth12:26
zygaone moment :)12:26
zygat's the fix we were talking about12:26
mborzeckiah, ok12:26
zygamborzecki: https://github.com/snapcore/snapd/pull/562012:38
zygahave a look12:38
zygawith this the hello-fedora snap should work on ubuntu12:38
mborzeckizyga: yeah, +1 as far as I'm concerned12:44
zygaI'm adding a spread test12:51
zygaand one more patch12:51
zygamborzecki: I pushed two more patches12:56
zygacan you sanity check them please12:56
zyganiemeyer: once you have some time it would be good to update spread snap, it's out of date and cannot even parse our spread.yaml now13:27
=== pstolowski|lunch is now known as pstolowski
mborzeckipstolowski: spread test for interfaces https://paste.ubuntu.com/p/PmJdPvR2hp/ (amazingly this all works locally, even with the content provider)13:49
pstolowskimborzecki: nice, will take a look, ty13:50
zygamborzecki: really nice :D13:52
zygacan someone manually run tests against https://github.com/snapcore/snapd/pull/562013:52
zygafor some ballpark works/doesn't qualification13:53
zygaubuntu + fedora + that one new test13:53
zygaI don't have a working spread setup here13:56
zygaI'll check back later in case anyone does o/13:56
mvozyga: /proc/self/attr/current is "unconfined" in my container when it can't load apparmor profiles with apparmor_parser -a13:57
mvozyga: I will use a workaround and prepare a pr13:58
stgrabermvo: lxc.apparmor.profile=unconfined13:58
mvostgraber: thank you!14:00
mborzeckizyga: running on ubuntu 18.04, fedora & arch14:02
zygamborzecki: thank you14:03
zygamvo: interesting14:04
zygamvo: and when you load a profile, what happens?14:04
zygawhat is the error you get14:04
zygamvo: and what is the profile of snapd from _outside_14:04
zygaor profile of bash inside a container14:04
zygastgraber: does that also disable stacking or is stacking controlled with a separate knob?14:05
stgraberzyga: that also disables stacking14:07
zygastgraber: I see14:08
zygastgraber: does lxd use something other than apparmor?14:08
zygaseccomp?14:08
stgraberzyga: so in that case, you're not confined but also don't have mac_admin/mac_override so can't affect the host apparmor namespace14:08
zygaah14:08
zygaI see14:08
stgraberzyga: we have seccomp too, yeah, and caps14:08
zygaand libcap cannot tell that?14:08
zygaI mean, can we ask the kernel about our caps/14:08
zygainstead of loading a profile14:08
mvozyga: hm, from outside it is also unconfined afaict14:08
zygamvo: yes, that's consistent and expected based on what stgraber said14:09
mborzeckizyga: 2018-08-09 16:12:05 Successful tasks: 314:12
zygamborzecki: thank you!14:21
zygamvo: another data point: gconv translation functions for fringe encodings are huge14:21
zygaand I suspect we need at most 2-314:22
mborzeckipstolowski: i've pushed the spread to the integration branch right here https://github.com/snapcore/snapd/pull/5596/commits/f846ea192d89f98c4b8c8b4036a935ef47589e5314:31
zygamvo: can you please ensure that the patch I sent is in 2.3514:37
zygait's pretty essential for now14:37
kyrofaHey mvo, did you manage to make any progress on discovering apparmor capabilities in snapd?14:39
mvokyrofa: yes14:40
mvokyrofa: I have a reproducer and work on code now14:40
kyrofamvo, ah, wonderful!!14:44
zygaChipaca: fun bug: snap refresh --jailmode doesn't15:32
zygait's not switching it15:32
Chipacazyga: fun bug: neither does --devmode nor --classic15:32
Chipacazyga: you  could almost say it might not be a bug :-D15:32
zygaChipaca: snap install --jailmode foo refuses to work when foo is classic!15:32
Chipacazyga: (OTOH if we don't do anything maybe we should error or sth)15:32
Chipacazyga: at your request iirc15:33
zygaChipaca: just dropping a note in case I forget, live feedback from flock15:33
Chipaca:-) nice15:33
Chipacazyga: keep 'em coming15:33
sil2100mvo: hmmm, would you be able to somehow get on a pi3 core18 running system and find me all the .yaml files that are on there? Since something's really fishy around here15:36
sil2100mvo: I unpacked and checked the image you gave me and found nothing suspicious - the only way console-conf could put the 'set-name' into the config is by copying it over from the source configs15:38
sil2100mvo: and there's just one source config on the squashfs that I see and it's correct15:38
sil2100hmm, let me try one more thing though15:38
mvosil2100: this bug prevents logging in so its slightly tricky, what I did was pulling out the sd card and mount it after I interacted with the system. does that work or are there still no files in there if you do that?15:39
sil2100mvo: wait one more moment, I'll get back to you once I check something else out on the filesystem15:40
zygakyrofa: hey15:41
zygakyrofa: can you please try building github.com/davdunc/aws-cli-snap please15:42
zygakyrofa: we're hitting an issue where apt fails on lack of --allow-unauthenticated15:42
zygakyrofa: is there a cache with a choot container or something15:42
zygakyrofa: can we clean something on the host15:43
zygakyrofa: to "maybe" fix it?15:43
jdstrandmvo: hi! are you planning a 2.34.4? this is in 2.34 branch, but not 2.34.3 snap/deb: https://github.com/snapcore/snapd/pull/557915:50
mvojdstrand: the plan is to have a beta of 2.35 soon (today or tomorrow moring). no further plans for 2.34 unless something critical somes up15:55
jdstrandwell, that works too15:55
mvocachio: the lxd test currently only runs on 16.04-32 - can we enable it again on more arches?15:56
jdstrandmvo: I've got some profile updates that I'd like in 2.35. when do you need them by?15:56
jdstrandmvo: early next week is best for me, but if required, I can do it sooner15:56
mvojdstrand: the first beta goes out this week but profile updates are fine until it hits candidate so at least a week15:56
mvojdstrand: next week is fine15:56
jdstrandok, perfect15:57
jdstrandmvo: thanks!15:57
mvojdstrand: we will just need to cherry-pick them15:57
mvojdstrand: thank you15:57
mvokyrofa: fix is ready I'm just working on the spread test now but manual testing looked good15:57
jdstrandmvo: that socketcall PR. should I target it to 2.35 too? it isn't pressing to me personally so long as it gets into trunk, but not sure of the relationship between 2.35 and core18 images16:01
mvojdstrand: please target it16:03
jdstrandmvo: ok16:04
kyrofamvo, that's great! Let me know if I can help16:04
mvojdstrand: what apparmor permissions are needed for doing "aa_kernel_interface_new()"?16:05
cachiomvo, I forgot to share the errors16:08
cachiohttps://paste.ubuntu.com/p/JRt3rkPTgY/16:08
mvocachio: ta16:08
cachiomvo, I am working in other set based on test fails16:09
=== pstolowski is now known as pstolowski|afk
* Chipaca kicks travis16:10
Chipacaok, i'm off to the shops, I'll be back later to see if it's progressed16:11
Chipacattfn16:11
jdstrandmvo: otoh, I don't know. the minimal most restricted set of rules on a 4.15 kernel is: https://paste.ubuntu.com/p/FjSxZ5pbwb/16:20
jdstrandmvo: you could reduce the /sys/kernel/security/apparmor/... down to '/sys/kernel/security/apparmor/{,**} r,'16:20
jdstrandbut I did it that way to see all the accesses16:21
mvojdstrand: thanks, I will push a PR shortly and will ask for advice16:21
jdstrandmvo: now, that is a simple 'run apparmor_parser under apparmor' test16:22
mvojdstrand: https://github.com/snapcore/snapd/pull/5621 <- is where I need it, hope this all makes sense. and also I wonder if there is a better way16:22
jdstrandmvo: DAC and profile stacking are going to be involved for more complicated things16:23
mvojdstrand: maybe I can use aa-status instead of apparmor_parser in the go code, that seems to be less noisy16:23
mvojdstrand: yeah, this is really just so that we can detect if all looks well but in fact its not16:24
jdstrandmvo: aa-status is definitely recommended, cause it will be updated to support new things. do note, it is python316:25
mvojdstrand: yeah, thats downside, I could create a small helper c-binary around aa_kernel_interface_new()16:25
jdstrandit is interestingly bi-lingual and will run under py2. but that is neither here nor there and just fun trivia16:25
mvojdstrand: :)16:25
jdstrandmvo: aa-status is not actually terribly smart. does it return non-zero in the case you are looking at?16:27
jdstrandmvo: I ask, cause you could implement its dumb test in Go I suspect (though again, you'd take on the maintenance burden of that)16:28
sil2100mvo: sucks that I don't have a raspi3 - I know that's probably a lot to ask, especially because of the size, but you think it would be possible for you to tar up the contents of the filesystem from the SD card after the invalid config is up and share it somewhere? Might make things easier for me to debug16:30
ograsil2100, you should really get one and expense the 30€ :)16:32
sil2100ogra: I think I'll just do that indeed, not the first time I'm poking on the raspi316:32
sil2100hmmm16:32
* sil2100 goes check on that16:33
ograits not like it is super expensive or so16:33
mvojdstrand: thanks, I will think a bit about it16:35
mvosil2100: lets debug that tomorrow then, I can help. plus buying/expensing one is probably fine16:36
mvokyrofa: pr#5621 but its a bit of a can of worms, so not sure if this will not need some more iterations16:36
jdstrandmvo: is it only that you don't have mac_admin?16:37
ograthey probably only gave him pc_admin :P16:37
ogra(SCNR .... the heat and such)16:38
jdstrandmvo: see my comments in the PR and this: https://paste.ubuntu.com/p/cTTqxwJpqf/16:55
kyrofajdstrand, this brief conversation might be helpful for reference: https://irclogs.ubuntu.com/2018/08/08/%23ubuntu-devel.html#t14:3516:56
kyrofa(regarding mac_admin)16:57
mvojdstrand: I'm not sure this is observable from inside the container17:01
zygaHey17:01
mvojdstrand: I tried looking at /proc/self/status and CapEff in there and AFAICT I have the right bits17:02
* zyga is resting after a very hot and busy day17:02
jdstrandmvo: you mean the kernel is telling you that you have mac_admin but you do not?17:02
mvojdstrand: correct, again with the caveat that I'm not an expert on this (yet)17:03
mvojdstrand: I have not used pscap for this, just the status file in proc but let me check with pscap17:03
jdstrandmvo: well, I'm not either, but that sounds wrong...17:03
mvojdstrand: note this is inside an lxd container17:03
* zyga tunes in17:03
mvojdstrand: and lxd itself restricts this cap (again AIUI)17:04
jdstrandtyhicks: hi! would it surprise you if inside a container, it reports having mac_admin but in reality, it does not?17:04
zygaKernel bugs, you tiny little kernel bugs, where are you? ;-)17:04
jdstrandtyhicks: (see backscroll for context)17:04
mvojdstrand: I just ran pscap and mac_admin is availalbe for everything. yet when I try to load a profile (empty) I get permission denied17:06
mvojdstrand: see the PR for how to construct such a test case, but its pretty simple17:06
jdstrandtyhicks: mvo's observance sounds like a bug ^. is it?17:06
jdstrandobservation*17:07
jdstrandmvo: so, loading a profile is certanly one way to do it, but that will spam the logs17:08
jdstrandmvo: I suspect there is an easier way17:08
mvojdstrand: (very) open for ideas17:09
jdstrandlet me try some things17:09
jdstrandI could see having mac_admin in the container and the wrapping apparmor profile denying it, but I thought the container was unconfined... maybe I misread somethign17:10
jdstrandtyhicks: fyi ^17:10
mvojdstrand: the container is unconfined17:11
jdstrandmvo: is this a new issue or are you trying to enable some tests that never ran/always failed before17:11
mvojdstrand: aiui lxd will take away (drop) cap_mac_admin (and override) in this case when running things17:11
mvojdstrand: this is an old bug but we never tried to fix it17:11
mvojdstrand: it was not even understood17:11
jdstrandoh, yeah, well, that would explain it I guess17:11
mvojdstrand: we got reports about this from various people but never looked into it until recently when iirc mborzecki and kyrofa  at the same time came up with this failure17:12
kyrofaYeah, this is an unprivileged lxc container with apparmor disabled, lxc doesn't want to make the host apparmor available17:12
kyrofaWhich makes sense given that it's still unprivileged17:13
jdstrandtyhicks: nm17:16
jdstrandmvo: I think if you open() /sys/kernel/security/apparmor/.remove, then write something valid (eg, "profile canary-blah {}"), then close the fd, you'll get permission denied17:49
jdstrandmvo: ie, use lowlevel calls to perform an atomic write on a profile that isn't loaded in the kernel17:50
jdstrandmvo: err, ie, use lowlevel calls to perform an atomic write on the .remove file to try to remove a profile that isn't loaded in the kernel17:51
jdstrandmvo: with mac_admin, you'd get ENOENT17:54
jdstrandmvo: eg:17:56
zygaMvo: I would suggest to use a profile name like snap.system.canary17:56
jdstrand$ sudo bash -c "echo canary >/sys/kernel/security/apparmor/.remove"17:56
jdstrandbash: line 0: echo: write error: No such file or directory17:57
jdstrand[1]17:57
jdstrand$ sudo aa-exec -p test -- bash -c "echo canary >/sys/kernel/security/apparmor/.remove"17:57
jdstrandbash: line 0: echo: write error: Permission denied17:57
jdstrand[1]17:57
zygaBecause we “own” that namespace17:57
jdstrandzyga: do we own the 'system' snap?17:57
jdstrandzyga: I mean, maybe snap.core.canary17:58
zygaYes17:58
zygaWe reserved system17:58
jdstrandwell, whatever, so long as it doesn't accidentally remove something17:58
* zyga cannot stand the weather today18:01
zygaIt’s 8PM but the temperature outside is the same as at noon18:01
kyrofazyga, tail end of summer, hang on18:02
kyrofaAlmost through18:02
kyrofaI hate it, too18:02
cachiozyga, hey18:11
cachioI see a weird error on core1818:11
cachiosome tests18:11
mvojdstrand: thanks for your suggestion in the PR - should I do the loading in the C code as well or just in the go code?18:11
cachiofail when we do MATCH 'xxx' < file18:12
cachiozyga, but if we do cat file | MATCH 'xxxx'18:12
cachioworks18:12
cachiozyga, any idea which could be the reason?18:12
mvocachio: that sounds like the subshell issue we found some days ago18:12
mvocachio: https://github.com/snapcore/spread/pull/67 maybe?18:13
cachiomvo, ahhhh18:13
jdstrandmvo: actually, I just found something even simpler18:13
jdstrandhttps://github.com/snapcore/snapd/pull/5621/comment#issuecomment-41184854818:13
cachiomvo, let me test it, I already have the spread with your change18:13
jdstrandmvo: ^18:13
mvojdstrand: nice!18:14
mvojdstrand: thats easy enough from both C and go18:14
kyrofajdstrand, nice find18:14
jdstrandmvo: yes. what is interesting is that a mac_admin denial is not triggered by that (you don't need mac_admin to read that file)18:16
jdstrandmvo: but you do need to be root18:16
jdstrandmvo: (even though the perms are listed as 444)18:16
cachiomvo, this fix the issue18:16
cachiothanks18:16
mvojdstrand: interessting. is this a reliable test. you write that you don't need mac_admin to read that file?18:17
jdstrandmvo: so this is DAC that is preventing it. while I'm root in the container, the container is running as non-root. non-root can't access the file18:17
mvojdstrand: my tst container runs as root - or are you saying it drops root at some point?18:18
kyrofajdstrand, does that test pass in a normal, unpriv container?18:18
kyrofa(without apparmor disabled)18:18
jdstrandkyrofa: yes18:18
jdstrandroot@xenial-unconfined:~# cat /sys/kernel/security/apparmor/profiles18:19
jdstrandcat: /sys/kernel/security/apparmor/profiles: Permission denied18:19
kyrofaBut you're still not root18:19
jdstrandthat's true. interesting18:19
jdstrandthat also feels like a bug18:19
mvojdstrand: I like this because a) simple b) no log spam - is it reliable, i.e. I hope it won't be "fixed" at some point :)18:19
mvojdstrand: but I would definitely like to have a way that avoids the log spam18:20
jdstrandmvo: the .remove of a non-existent profile would avoid log spam18:20
jdstrandmvo: and is a true mac_admin test18:20
mvojdstrand: cool, then I will go with this - should I do the same in the C code?18:21
mvojdstrand: actually I think there is no log spam there18:21
jdstrandmvo: what do you mean no log spam?18:21
jdstrandwhere?18:21
mvojdstrand: will update the (go) code now to use the removal of a non-exiting profile - I will just create a random strings18:22
mvojdstrand: I had to update snap-confine as well18:22
mvojdstrand: to detect if apparmor is fully usable18:22
mvojdstrand: but the C code does not log anything so that should be ok(?)18:23
jdstrandmvo: I'm confused by this conversation, but if you write a non-existent profile name to /sys/kernel/security/apparmor/.remove, you will get an ENOENT when have mac_admin, and EPERM or EACCES if you don't. in neither case will there be a log entry18:23
jdstrand(I say 'or' cause otoh I don't know which)18:24
jdstrandmvo: in your current implementation, you are successfully loading a valid profile. that will create an entry in the audit subsystem. then you remove it, and it will create a second entry for that18:25
jdstrandmvo: I was wondering why you are updating both snap-confine and go code?18:26
mvojdstrand: sorry for the confusion. the go check is needed to ensure that snapd does not try to load the apprarmor profiles it generates into the kernel (which will fail)18:29
jdstrandand snap-confine is for change_onexec18:29
mvojdstrand: the snap-confine code needs updating because it has its own detection for apparmor and if it detects that is has apparmor it will set aa_change_on_exec() which will fail too18:30
jdstrandsince the profile isn't there18:30
jdstrandright18:30
jdstrandok18:30
mvojdstrand: well, even if it is it can't change it, right?18:30
mvojdstrand: or does not not require privs?18:30
mvojdstrand: in any case, yes, its not there as well :)18:30
jdstrandmvo: it doesn't need mac_admin to change profiles, but it can't change profiles if the profile isn't loaded18:30
mvojdstrand: gotcha, thanks!18:31
jdstrandmvo: the .remove that you are going with (which I think is fine), is a bit of a hack. can you add a comment on why you are doing it that way?18:31
mvojdstrand: sure18:31
jdstrandthanks18:31
cachiomvo, in core18 when we get the snap env18:41
cachiothe SNAP_INSTANCE_xxx are not there18:41
cachiothis is making fail the test snap-env18:41
mvojdstrand: I pushed an update to the PR18:57
mvojdstrand: I will read comments in the PR - thanks for all your help!18:59
* mvo calls it a day18:59
zygawhy is ubuntu-image crashing lately?19:31
=== phillid is now known as Guest12690
jdstrandstgraber: hey, on a 4.15 kernel (bionic), if I have an apparmor denial in the the container's policy, where would I see that logged? journald isn't showing me what I expect19:58
stgraberjdstrand: I'd expect it to hit the kernel log which may or may not be readable by the container19:59
jdstrandok, I was looking on the host19:59
jdstrandstgraber: otoh, with lxc.apparmor.profile=unconfined, should I see that in the container?20:01
stgraberwell, with that in place you shouldn't be able to get any denial because there'd be no apparmor in place20:01
jdstrandstgraber: but there is a lxd-xenial-unconfined profile. what is that for?20:02
stgraberwhen you use raw.lxc you play behind LXD's back, so LXD doesn't know the profile it's generating won't be used20:03
jdstrandI see20:03
jdstrandstgraber: ok, do you have an idea why cat /sys/kernel/security/apparmor/profiles gets an EACCES with:20:04
jdstrandconfig:20:04
jdstrand  raw.lxc: |20:04
jdstrand    lxc.apparmor.profile=unconfined20:04
jdstrandlxc exec xenial-unconfined -- cat /sys/kernel/security/apparmor/profiles20:04
jdstrandcat: /sys/kernel/security/apparmor/profiles: Permission denied20:04
stgraberis that container unprivileged?20:04
jdstrandstgraber: yes20:04
stgraberthen that's normal20:05
stgraberunprivileged users can't read that file20:05
jdstrandbut they can20:05
stgraberstgraber@castiana:~$ cat /sys/kernel/security/apparmor/profiles20:05
stgrabercat: /sys/kernel/security/apparmor/profiles: Permission denied20:05
jdstrandthere is something weird going on. let me paste20:05
stgraberjdstrand: if you're in a normal container, you can because an apparmor namespace is setup20:06
stgraberjdstrand: well, root in the container can20:06
stgraberbut in this case, you're in an unprivileged container without an apparmor namespace, so you have as much right as a nobody user on the host20:06
jdstrandstgraber: https://paste.ubuntu.com/p/4FzwpSFs2B/20:07
jdstrandstgraber: ah, ok, that explains it then20:08
jdstrandstgraber: thanks!20:08
zygajdstrand: hey20:27
zygajdstrand: can you please (if possible) whitelist fedora29 as "type: base"20:27
zygajdstrand: I pushed a pair of revisions just now20:29
zygajdstrand: if you cannot make that permanent please at least ack those two20:29
jdstrandzyga: who is responsible for that base?20:39
zygajdstrand: currently just me, we are working with the fedora server SIG to transfer it over and they are happy to take it20:39
zygajdstrand: I just need it for a talk tomorrow20:39
zyga(I'm at a fedora conference this week)20:40
zygajdstrand: it won't go to stable before the hand off20:41
jdstrandzyga: I'll approve it since you did it, but we have no process surrounding base snap reviews, so that should be discussed in the forum with niemeyer's input20:41
zygaI don't disagree, it's the first of the kind so we need to figure out the process20:42
zyganext week we should all be back20:42
zygaso we can discuss20:42
jdstrandsounds fine20:42
zygathanks!20:42
zygathank you, I just published both to edge20:50
jdstrandnp20:50
zygaI will publish the code for making those now20:50
ograhrm ... i wish snap find had a "by interface" search function20:55
jdstrandthat would be handy20:55
ograyeah20:55
zygaogra: check out fedora2920:56
zyga18M20:56
ogra?20:56
zygabase snap :)20:56
ograas broekn as core 18  ? like ... missing everything useful ? :P20:56
ogra(does it ship vi ? :) )20:57
zygaogra: it doesn't ship vi, it's not a boot snap20:57
zygait's just a base snap for apps20:57
zygait ships a lot of locale actually20:57
zygathere's a hello-fedora snap as well but you need for a PR to land to use it20:57
ografor what ?20:57
zygaI mean, there's a demo snap works on top of fedora29 now20:58
zygabut it is broken on ubuntu because of a bug this uncovered20:58
zygaand we need for a PR to land to fix that20:58
ograwell, congrats in any case !20:58
zygaogra: there's more20:58
zygaopensuse is next20:58
* ogra twiddles thumbs watching store downloads at 400kB/s20:59
zygaas in, we have a +1 from sysrich20:59
ograyay20:59
zygaogra: wanna see how it's made?20:59
ograis there a GH tree to look at ?21:00
ogra(not right now, but i'd indeed like to take a look)21:00
zygaI'm making a new repo for it21:00
zygathough not on GH, fedora loves other places (gitlab)21:00
ograheh, well21:00
ograsome git web UI ...21:01
ograman ... thats so annoying21:01
ograwhy is the store so super slow at times21:02
ograbooo !21:05
* ogra installed qemu-git just to find it is also compiled without sdl or gtk support ... 21:05
ograi was kind of hoping it had some advantage over the archive qemu except being newer21:05
ogragrrr ... and no -redir ...21:06
zygaogra: do you have air conditioning at home?21:10
zygaogra: this hotel is a bit quaint it that it ... doesn't21:10
zygaeveryone is melting this week21:10
ogranope, like most gerans i dont have air conditioning21:11
ogra*germans21:11
ograwe do have 60cm brock walls ...21:11
ogra*brick21:11
zygaogra: yeah, same in poland21:12
zygathis summer is tough21:12
ograthey are usually good enough for 30+ C for two weeks with keeping the heat out21:12
zygaall the media markts sell AC now21:12
zygaand I'm seriously considering one21:12
zygabut first I need to get home :)21:12
ograbut this was 8 weeks without rain and constantly above 2521:13
zygaI hope my next flight through FRA won't be this interesting21:13
ograso now, even we had big thinderstorms today and it cooled down a bit, the house now is an oven21:13
ografra was shut down again today21:13
ogradue to the heavy weather21:14
ograand tomorrow ryanair pilots go on strike21:14
ograthe weekend will not be fun to fly through FRA for sure21:14
ograzyga, when do you fly back ?21:15
zygasunday21:15
ograwith luck it has somewhat settled then21:15
ograthe ryanair thing cancelled a few 100 flights ... people will be re-booked on other airlines ... so everything will be awfully crowded21:16
ograand there is still the fallout from today too ...21:16
ograogra@acheron:~/Devel/anbox$ qemu-git.qemu-system-x86-64 -m 4096 -vga virtio /home/ogra/Devel/anbox/anbox-image.img21:17
ograqemu-system-x86_64: -vga virtio: Could not open '/home/ogra/Devel/anbox/anbox-image.img': Permission denied21:17
ograARGH !21:17
ograno home interface ...21:17
ograogra@acheron:~/Devel/anbox$ qemu-git.qemu-system-x86-64 -m 4096 -vga virtio /home/ogra/snap/qemu-git/current/anbox-image.img21:22
ogra...21:22
ograqemu: could not load PC BIOS 'bios-256k.bin'21:22
ograGRRRRR !21:22
* ogra ponders to make a proper qemu snap in the weekend 21:23
ograhow annoying21:23
zygaogra: that would be useful :)21:23
ograzyga, well, there is one ... even from a canonical employee it seems21:24
ograbut last touched 16 months ago and only in beta/edge21:24
zygaI was looking for JDK as a snap today21:24
ograwell, thats quickly and trivially snapped21:24
ograjust a stage-package entry and some file copying21:25
* ogra goes back to battle with the deb qemu version then21:27
ogra... i know why i prefer arm boards ... so much easier :P21:28
zygaogra: https://gitlab.com/zygoon/fedora2921:58
zygajdstrand: ^ FYI21:59
jdstrandcool21:59
ogranice, pretty straightforward ...22:16
zygajdstrand: could you re-approve fedora29 uploads please, that's the last time for today22:52
zygajdstrand: I had to work around a bug that is present in released versions22:52
zygajdstrand: they should now also work on Ubuntu if you want to try22:56
zygajdstrand: (along with hello-fedora from stable or from candidate)22:56
sergiusenskenvandine: hey, when launching the simple-scan snap I get an endless loop of "cp: '/home/sergiusens/.config/user-dirs.locale' and '/home/sergiusens/.config/user-dirs.locale' are the same file23:00
sergiusens"23:00
* zyga wonders if anyone apart from mvo and jdstrand can unblock store reviews23:06

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!