[00:32] SuperLag: https://wiki.ubuntu.com/fai-in-ubuntu [00:32] SuperLag: Ah, and https://landscape.canonical.com/ [03:05] hey, so i have phpmyadmin up and i'm trying to connect to mysql database and i'm getting an error [03:06] mysqli_real_connect() connection refused [03:06] #2002 connection refused; the server is not responding [03:07] apache2 seems to be up and so does my mysql database [03:08] so, i checked and i can log on with mysql -u guest etc..... [03:08] while i can't log on with -u guest -wrong password [03:09] so, i think i added a guest account to my database correctly === havenstance_ is now known as havenstance [04:55] good morning [06:06] Good morning [08:48] Hi there. I am having an issue connecting a gluster node on ubuntu to a gluster server running CentOS [08:49] I keep getting PEER_CONNECT and PEER_DISCONNECT events in the logs [09:25] coreycb: errant /usr/etc/ directories in python{3}-project's are nice for upgrades [09:25] fixed cinder [11:42] jamespage: testing py2->py3? [11:42] upgrades [13:29] coreycb: yeah [13:30] ahasenack: It looks like app armor isn't enabled in the test environments for strongswan [13:31] kstenerud: "test environment" is just a vm you brought up, right? The test itself isn't messing with apparmor probably [13:31] kstenerud: have you tried enabling it before running the test? [13:35] ahasenack: aa-enabled says yes, but then aa-status gives: [13:35] 1 processes are unconfined but have a profile defined. │ [13:35] /usr/lib/ipsec/charon (1769) │ [13:35] kstenerud: sometimes there are races with systemd and apparmor profile loading [13:35] kstenerud: have you tried "service strongswan restart" ? [13:38] that did it :) [13:41] interesting bug [13:45] which is why the regression tests didn't catch this I guess [13:49] kstenerud: all my strongswan deployments have Apparmor enabled and I never ran into this missing /proc/$PID/fd/ read rule. I think this is very specific to the reporter's config [13:52] ahasenack: I think the way to avoid this race would be to either tell systemd to apply an Apparmor profile as part of the unit file (not really applicable for stronswan) or put a dependency so that apparmor loading is done before starting the strongswan service [13:55] sdeziel: can't an apparmor profile for a service be enabled without restarting the service? I would think that's possible [13:57] kstenerud: btw, you can update the postfix sru card, did you see the emails? [13:58] ahasenack: Is that the bug tracker email? [13:58] launchpad email, yes. I got it, as I'm subscribed to that bug [13:58] ahasenack: according to man 7 apparmor, no: "Profiles are applied to a process at exec(3) time ; an already running process cannot be confined." [14:00] killing charon would probably have it started back by systemd but that's a bit intrusive too [14:14] hmm that's weird... When I try loading the testing env on cosmic, there's no aa-profile cmd [14:18] ahasenack: I've run the tests on cosmic and they work, so the bug was fixed somewhere between 5.6.2 and 5.6.3 [14:19] so this would be a backport fix to bionic, right? [14:19] kstenerud: did you see the error before? [14:19] I saw the error when running a bionic vm [14:19] kstenerud: check /etc/apparmor* when installing 5.6.3 in cosmic to see if the changed profile line is in there [14:19] it might be in an abstraction directory [14:22] ahasenack: I don't see it applied in /etc/apparmor.d [14:22] hm [14:22] what was the line again? [14:22] from the patch [14:22] + @{PROC}/@{pid}/fd/ r, [14:22] right after /var/lib/strongswan/* r, [14:23] in usr.lib.ipsec.charon [14:24] did you check the abstractions directory? [14:24] yes. Didn't see anything about charon in there [14:25] it doesn't have to be about charon, it could be a generic permission, for all services to use if needed [14:26] abstractions/bash: @{PROC}/@{pid}/mounts r, <-- example [14:27] well, bad example [14:27] OK. I don't see anything about @{PROC}/@{pid}/fd/ except in ubuntu-browsers [14:27] abstractions/base: @{PROC}/@{pid}/{maps,auxv,status} r, <- more interesting one (generic) [14:28] yeah [14:28] then either it's not trying to read that, or apparmor isn't applied [14:29] when I aa-status, I see that /usr/lib/ipsec/charon is in enforce mode [14:29] oh hang on. that's just profile [14:30] you can also use ps faxwZ [14:30] there we go, the process is now in enforce mode [14:30] the Z option will add a column about confinement to each row [14:31] OK, running in enforce mode the test succeeded [14:31] and you got a denied? [14:31] nope [14:32] I'll try a second run with bionic. The tests didn't even finish on that [14:32] ok [14:32] vms or containers? [14:32] vms [14:32] good [14:33] I prefer vms when dealing with apparmor [14:38] with IPsec, VMs are needed for 95% of the use cases anyway [14:39] yeah [14:40] jamespage: hit the same thing with heat. fixing. [14:40] coreycb: hurrah [14:40] ahasenack: Hmm strange it didn't fail this time [14:40] coreycb: I might run a quick non-charm test [14:41] jamespage: that's what i'm doing. just looping through all the packages and upgrading. [14:41] coreycb: oh ok [14:41] * jamespage stands backj [14:42] ahasenack: I'm doing this to test: https://pastebin.ubuntu.com/p/w4HQchZVfH/ [14:48] kstenerud: and do you see the denied message in bionic? [14:48] and the test failing? [14:48] No, not this time [14:48] Last time I did get a failed test [14:49] oh wait wtf... charon isn't in enforce mode again [14:50] oh nm. The tests shut down strongswan [14:51] So I can't trigger the bug from these tests. I might have triggered something else beause I was trying different ways to do it [14:51] kstenerud: are you "taking over" that strongswan MP that we received? [14:51] yes [14:51] k [14:51] But I can't trigger the bug he had, so I can't verify the fix [14:52] hrmph [14:52] I did see a similar looking fix in upstream strongswan, though [14:52] was there a proper bug for it? [14:53] lp bug [14:53] Our bug is https://bugs.launchpad.net/ubuntu/+source/strongswan/+bug/1786250 [14:53] Launchpad bug 1786250 in strongswan (Ubuntu) "strongswan (charon) is rejected by apparmor to read /proc//fd" [Undecided,In progress] [14:53] Not sure if the upstream fix was from that or a private bug report to the authors [14:54] kstenerud: what is the upstream change that could be related? [14:55] oh wait no. I'm getting confused by logwatch stuff :P [14:55] So no, there's no upstream fix. This is an apparmor and strongswan issue [14:56] ok [14:56] well, I don't have a handy strongswan config to check this out more carefully [14:56] if you think you could get to one with the hints from the test, go ahead, we could use it, as I'm sure this is not the last strongswan bug we will have to handle [14:56] but beware the rabbit hole :) [14:57] and the reporter went MIA [14:57] maybe what's needed is a service restart after the vpn is established, or a reload, or some other interaction with the daemons [14:58] or a logrotate to kick in [14:58] etc [14:58] ok, I'll see what I can come up with [14:59] I think the issue is somehow related to /etc/resolv.conf handling [15:07] If it would help, I'm currently working on a strongswan deployment, and might be in a position to try to reproduce the issue, if it'd help [15:08] I've been kicking a Cisco 860 series that doesn't want to play nicely with L2TP/IPsec too, due apparently to only offering IKE 3des-sha1-modp1024 [15:09] TJ-: Yes, I just need a setup that I can put in a repro case [15:10] kstenerud: remind of the bug number again, I'm on a different PC than when it was mentioned yesterday [15:11] https://bugs.launchpad.net/ubuntu/+source/strongswan/+bug/1786250 [15:11] Launchpad bug 1786250 in strongswan (Ubuntu) "strongswan (charon) is rejected by apparmor to read /proc//fd" [Undecided,In progress] [15:18] kstenerud: I'll spend some time on it over the weekend whilst the office here is empty, see what I can come up with. It looks like the ipsec config hasn't been provided by the user, and the 16.04>18.04 d-r-u is likely the culprit [15:27] Great! Thanks! [15:32] kstenerud: so I don't waste time, in the bug and MP there's talk of not being sure when 'it' was introduced but to me it isn't entirely clear what 'it' is! Is that referring to the apparmor profile change/difference, or accessing /proc/self/fd/ ? [15:36] TJ-: It worked in xenial, broke in bionic, and the fix apparently is to add @{PROC}/@{pid}/fd/ r, to usr.lib.ipsec.charon [15:39] under /etc/apparmor.d [15:44] kstenerud: yes, I understood that bit, but the 'it' referred to - was it adding the apparmor profile, or strongswan reading /proc/self/fd/ ? From what I can see from the history, /proc/self/fd/ was added in 2015 before the xenial version was released so should be in that version, but the debian/usr.lib.ipsec.charon apparmor profile was added in 2016/2017 via an import from Debian. [15:54] I think it was strongswan attempting to read /proc/self/fd/ [16:11] Yes, that was introduced with commit b410d7f8ff [16:28] the apparmor change was introduced into Debian 5.5.1-3 via commit 9e71a10822 === not_phunyguy is now known as phunyguy [16:45] TJ-: Which repo is that? [16:53] I added Ubuntu and Debian git repos to the upstream, as remotes, and tracked the changes from those [16:53] 9e71a10822 came in via Debian [17:33] I wonder why the samba apport hook doesn't offer to include /var/log/samba/log* [17:33] usually systemctl status doesn't have enough information === cryptodan_mobile is now known as cryptodan === cryptodan is now known as cryptodan_mobile