/srv/irclogs.ubuntu.com/2021/01/26/#snappy.txt

mborzeckimorning07:03
mupPR snapd#9819 closed: snap-confine: make host /etc/ssl available for snaps on classic <Needs Samuele review> <Squash-merge> <Created by mvo5> <Merged by mvo5> <https://github.com/snapcore/snapd/pull/9819>07:31
mborzeckimvo: hey, i think we should land the errno fix that you have and try to look into cleaning up the errno mess in our code07:41
mborzeckimvo: maybe it's as simple as having a separate die_with_error(..) that takes explicit errno parameter like we discussed with zyga07:41
mvomborzecki: works for me07:55
mvomborzecki: thanks for this, I would love to have it in 2.4907:56
pstolowskimorning08:01
mvogood morning pstolowski08:03
mborzeckipstolowski: hey08:05
mvopstolowski: good morning08:10
mborzeckihmm why are the unit test results not cached between runs in github08:21
mborzeckilooks like the withbootassetstesting tag adds ~4m of the unit test job as all test get run08:22
mborzeckihmm same for nosecboot tag08:23
mborzeckimaybe it's because govendor sync runs in between08:24
mupPR snapd#9837 closed: cmd/snap-repair: filter repair assertions based on bases + modes <Needs Samuele review> <UC20> <Created by anonymouse64> <Merged by mvo5> <https://github.com/snapcore/snapd/pull/9837>08:36
mupPR snapd#9848 closed: overlord/devicestate, sysconfig: do nothing when cloud-init is not present <Created by bboozzoo> <Merged by bboozzoo> <https://github.com/snapcore/snapd/pull/9848>13:13
pedronismborzecki: mvo:  hi, is there a reason why the code in mountedfilesystem.go tends to use VolumeContent instead of LaidOutContent ?13:38
mborzeckipedronis: because it's a regular filesystem content, one cannot specify its position using start offsets13:39
pedronismborzecki: but we could use LaidOutContent, or not?13:40
pedronismborzecki: I mean the input is ps         *LaidOutStructure  but then we don't use the LaidOut bits13:41
mborzeckipedronis: i mean LaidOutContent is defined as having only raw content, we could not be populating it even for a filesystem structure13:41
pedronisI see13:43
mupPR snapd#9862 opened: github, run-checks: do not collect coverage data on subsequent test runs <Skip spread> <Created by bboozzoo> <https://github.com/snapcore/snapd/pull/9862>13:53
mupPR snapcraft#3429 closed: plugins: Pin pip to supported versions <Created by philroche> <Merged by sergiusens> <https://github.com/snapcore/snapcraft/pull/3429>13:57
mupPR snapd#9863 opened: tests: use 6 spread workers for centos8 <Simple 😃> <Created by sergiocazzolato> <https://github.com/snapcore/snapd/pull/9863>13:58
mupPR snapcraft#3428 closed: plugins v1: Pin pip to supported versions <Created by philroche> <Merged by sergiusens> <https://github.com/snapcore/snapcraft/pull/3428>14:37
mborzeckihmmmm the first run-checks --unit run on my system is ~5m, then with SKIP_COVERAGE i added in 9848, removing secboot & setting the build tag as we do in gothub test workflow it's 20s, but it seems to be different on gh14:49
mborzeckis/9848/9862/14:49
ijohnsonhmm do we have a way to silence seccomp denials ?15:02
ijohnsonI know we have `deny` for apparmor, but do we have a similar mechanism for seccomp ?15:03
mupPR snapd#9852 closed: gadget: enable multi-volume uc20 gadgets in  LaidOutSystemVolumeFromGadget; rename too <Bug> <UC20> <Created by anonymouse64> <Merged by anonymouse64> <https://github.com/snapcore/snapd/pull/9852>15:03
* cachio lunch15:05
mborzeckiijohnson: there's log, but that logs ;)15:07
mborzeckiand it's the default iirc15:07
ijohnsonright15:07
mborzeckiijohnson: i understand you're referring to that sched_setaffinity thing15:07
ijohnsonmborzecki: yeah15:07
ijohnsonit just occurred to me that I don't know how to silence seccomp denials15:07
mborzeckiijohnson: i think we should just make that part of the browser-support15:07
ijohnsonyeah I think so too15:08
ijohnsonbrowser-sandbox: true already allows lots of other dangerous things anyways15:08
mborzeckiimo it's a valid use case to pin a thread to some cpu in a browser15:08
mborzeckigiven how performance optimized they are15:08
mborzeckiijohnson: we need to run that by security though, don't we?15:09
ijohnsonyes it would need a security review15:09
mborzeckireviews and spread runs will take longer than the change anywa ;), it's a one liner afaict15:10
ijohnsonhaha yes true15:10
mborzeckimaybe two, if one adds a comment15:11
ijohnsoncachio: have you ever seen this sort of nested failure? https://pastebin.ubuntu.com/p/ZJs5wYRpYb/15:18
ijohnson```15:18
ijohnsonCode=qemu-system-x86_64: /build/qemu-uc0X9e/qemu-4.2/include/hw/core/cpu.h:633: cpu_asidx_from_attrs: Assertion `ret < cpu->num_ases && ret >= 0' failed.15:18
ijohnson```15:18
mupPR snapd#9864 opened: gadget/gadget.go: rename ubuntu-* to system-* in doc-comment <Simple 😃> <Skip spread> <Created by anonymouse64> <https://github.com/snapcore/snapd/pull/9864>15:19
ijohnsoncachio: or I guess a better log is this pastebin https://pastebin.ubuntu.com/p/kxPs7ZZxCs/15:19
mupPR snapd#9865 opened: interfaces/browser-support: allow sched_setaffinity with browser-sandbox: true <Bug> <Needs security review> <Simple 😃> <Created by anonymouse64> <https://github.com/snapcore/snapd/pull/9865>15:24
jdstrandijohnson: re seccomp denials, we do not on a per rule basis. it would be possible to add a flag similar to 'unrestricted' to tell the compiler to not log15:30
ijohnsonjdstrand: hey! so that would be a change in snap-seccomp compiler, correct ?15:30
jdstrandijohnson: yes, and would be 'profile wide' (ie, not concept of per-rule)15:31
jdstrandno*15:31
ijohnsonhmm I see15:31
ijohnsoncachio: I see another case of that odd qemu failure: https://pastebin.ubuntu.com/p/X8VYMzdwZ4/15:31
=== jamespage_ is now known as jamespage
mupPR snapcraft#3430 opened: More improvements for using python3.8 from within a snap <Created by kenvandine> <https://github.com/snapcore/snapcraft/pull/3430>16:02
cachioijohnson, checking16:30
cachiothnaks for sharing this16:30
ijohnsoncachio: np, have you seen it before?16:32
cachiono, first time16:32
ijohnsonit doesn't happen every time, just sometimes, it's very weird16:32
cachioyes, need to google a bit16:34
mupPR snapd#9857 closed: bootloader/assets: support injecting bootloader assets in testing builds of snapd <Run nested> <Simple 😃> <Created by bboozzoo> <Merged by anonymouse64> <https://github.com/snapcore/snapd/pull/9857>17:19
mupPR snapd#9866 opened: osutil/stat.go: add RegularFileExists <Simple 😃> <Skip spread> <Created by anonymouse64> <https://github.com/snapcore/snapd/pull/9866>18:04
=== ijohnson is now known as ijohnson|lunch
=== ijohnson|lunch is now known as ijohnson
jdstrandstgraber: hey, so according to https://ubuntu.com/blog/lxd-4-0-lts-stable-release-is-now-available 4.0/stable is the lts, right?19:14
jdstrandstgraber: ah, yes. https://linuxcontainers.org/lxd/getting-started-cli/#choose-your-release19:15
jdstrandstgraber: nm19:15
mupPR snapcraft#3431 opened: godeps spread test: use latest/stable go snap <Created by cjp256> <https://github.com/snapcore/snapcraft/pull/3431>19:17
bandalihi, does one have to anything special to use ssl certs in a snap?20:12
bandalis/have to/have to do/20:13
ijohnsonbandali: can you be more specific? what are you trying to do ?21:14
bandaliijohnson, the jami snap has been failing to make connections over https to https://ns.jami.net, and i'm wondering if we have to do any hacks/worksarounds to fix it21:19
bandaliit works in basically every other scenario/environment21:19
ijohnsonbandali: hmm that website seems to have a valid SSL cert so I'm not sure what the problem would be21:19
ijohnsonbandali: how does the problem manifest itself?21:20
bandalii think it's due to absence of certs in /etc/ssl/certs21:20
bandaliijohnson, you can try reproduce this by `snap install jami`, then try to create a new account and register a username21:20
bandaliit will try to make a connection to https://ns.jami.net/name/yourdesiredusername but it always fails21:20
ijohnsonbandali: at least with another strictly confined snap, I can access that site just fine with curl from inside the snap's environment21:21
bandaliijohnson, ha. we use a low-level cpp library, asio, which basically interfaces with openssl or libressl and calls its SSL_CTX_set_default_verify_paths21:23
ijohnsonbandali: well using curl it seems to be fine, I guess I don't see why it wouldn't work from inside a strict snap21:23
ijohnsonyou have access to the ssl certs from the base snap that jami uses21:23
bandaliijohnson, do we have to set any special envs/paths like SSL_CERT_DIR for that to work?21:24
ijohnsonI don't know, that depends on what libraries you are using21:24
bandalicjp256 also mentioned (in #snapcraft) that ssl certs are available from the base snap; and i'm wondering where its location/path is, and if we had to set any envs21:24
ijohnsonbandali: it should be available from /etc/ssl/certs21:25
bandalias i mentioned, we use asio which in turns uses openssl or libressl21:25
bandaliijohnson, would that get packaged/included in the produced jami snap file itself?21:25
bandalibecause as of now etc/ssl/certs in the jami snap file doesn't exist and/or is empty21:25
ijohnsonbandali: no that comes from the snap's base snap, if you isntall the snap and then run `snap run --shell jami` you can do `ls /etc/ssl/certs` and see the ssl certs from the base snap21:26
bandalii see. thanks i'll try that in a sec to be sure21:26
bandalihuh, /etc/ssl/certs is empty there21:27
ijohnsonbandali: what OS are you on ?21:27
bandaliijohnson, this is on a ubuntu 20.10 vm. though, i was recently trying with adding ca-certificates to stage-packages and setting a layout bind at /etc/ssl/certs as a workaround. i commented those out and am doing a quick rebuild to try again to be sure21:29
bandalioh, turns out a 'quick rebuild' is unfortunately a full rebuild :-p i'll report back in 30-40 mins or so :-)21:34
ijohnson:-)21:34
mupPR snapd#9863 closed: tests: use 6 spread workers for centos8 <Simple 😃> <Created by sergiocazzolato> <Merged by sergiocazzolato> <https://github.com/snapcore/snapd/pull/9863>21:36
bandaliinteresting... looks like /etc/ssl/certs does in fact include certificates22:04
bandaliupon a closer look (using strace), it seems we're for some reason trying to look up certs in /root/parts/jami/build/daemon/contrib/x86_64-linux-gnu/etc/ssl rather than /etc/ssl. i'll see if other jami devs have any idea as to why22:09
ijohnsonthat would certainly explain it22:11
bandali:-) what a rabbithole. quite curious to see where it leads22:14

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!