/srv/irclogs.ubuntu.com/2021/09/14/#snappy.txt

mborzeckimorning06:25
mborzeckithe car just rolled into the shop06:26
mupPR snapd#10754 closed: packaging, tests/lib/prepare-restore: build packages without network access, fix building debs with go modules <Simple 😃> <Created by bboozzoo> <Merged by bboozzoo> <https://github.com/snapcore/snapd/pull/10754>06:32
mupPR snapd#10772 opened: kernel/fde: mock systemd-run in unit test <Created by mardy> <https://github.com/snapcore/snapd/pull/10772>06:32
mardymborzecki: hi!06:34
mborzeckimardy: hey06:35
mardymborzecki: I hope that the gates of the shop were open, when the car rolled in06:35
mborzeckihahah06:36
mborzeckibut the traffic is real bad at this time of day, took more 1:10h to drive from NW suburbs to the show which is in the southern part of lodz06:37
mborzeckimvo: hi, shall we land https://github.com/snapcore/snapd/pull/10661 ?06:58
mupPR #10661: cmd/libsnap-confine-private: device cgroup v2 support <Complex> <cgroupv2> <Created by bboozzoo> <https://github.com/snapcore/snapd/pull/10661>06:58
zyga-mbpgood morning :)06:59
zyga-mbpamurray not as pretty as before but non the less interesting https://twitter.com/zygoon/status/1437666089773813764?s=21 :)07:00
mvomborzecki: +107:02
mvomborzecki: in a meeting right now, but I can do it after07:02
mborzeckizyga-mbp: fungi?07:03
zyga-mbpmborzecki yeah07:03
mborzeckinew hobby?07:03
zyga-mbpnot new :)07:03
zyga-mbpbut I don't plan on eating it, it was just interesting to see07:03
zyga-mbpthey are not as rare as, say, 10 years ago07:03
pstolowskimorning07:03
mborzeckihaha07:03
zyga-mbpbut I only see them several times a year07:04
mborzeckipstolowski: hey07:04
zyga-mbphey pstolowski :)07:04
pstolowskio/07:04
mborzeckimardy: can you adjust the PR title in https://github.com/snapcore/snapd/pull/10764 before landing?07:17
mupPR #10764: tests: allow spread tests to skip the OOM test <Squash-merge> <Created by mardy> <https://github.com/snapcore/snapd/pull/10764>07:17
mardymborzecki: sure, let me actually squash the commits too07:25
mardydone07:28
mborzeckimardy: hm thinking about https://github.com/snapcore/snapd/pull/10772/ perhaps the problem is that fde tests use the real systemd-run at all07:36
mupPR #10772: kernel/fde: mock systemd-run in unit test <Created by mardy> <https://github.com/snapcore/snapd/pull/10772>07:36
mardymvo: can you please use your superpowers on https://github.com/snapcore/snapd/pull/10762?07:36
mborzeckimaybe we should have a thing that kind of behaves like systemd-run in testutil?07:36
mupPR #10762: o/servicestate: Update task summary for restart action <Simple 😃> <Created by mardy> <https://github.com/snapcore/snapd/pull/10762>07:36
mvomardy: sure07:36
mupPR snapd#10762 closed: o/servicestate: Update task summary for restart action <Simple 😃> <Created by mardy> <Merged by mvo5> <https://github.com/snapcore/snapd/pull/10762>07:37
mardymborzecki: yes, it looks like they are using the real systemd-run07:38
mardymvo: thanks!07:38
mborzeckihttps://paste.ubuntu.com/p/5FNF4R3mYg/ hmm microstack interface unit tests failing on distro not using /usr/lib?07:39
mardymborzecki: thanks, I'll fix it07:41
mardymborzecki: is it on a machine we have in our spread?07:41
mborzeckimardy: already have a change, i'll opena  PR in a minute07:42
mborzeckimardy: https://github.com/snapcore/snapd/pull/1077307:44
mupPR #10773: interfaces/builtin: fix microstack unit tests on distros using /usr/libexec <Simple 😃> <Skip spread> <Created by bboozzoo> <https://github.com/snapcore/snapd/pull/10773>07:44
mardymborzecki: interfaces/builtin/common_test.go is using %v in this case, is there any difference?07:45
mborzeckimardy: not really, %s means that we're expecting a string already, %v otoh means that go will try to use the default format whcih is the same as %s07:46
mupPR snapd#10773 opened: interfaces/builtin: fix microstack unit tests on distros using /usr/libexec <Simple 😃> <Skip spread> <Created by bboozzoo> <https://github.com/snapcore/snapd/pull/10773>07:47
mborzeckihmm we run the docker-smoke test only on ubuntu, guess it's expected that the snap being docker may not work properly anywhere else right?08:00
mborzeckimvo: something isn't quite working in the docker snap when cgrou pv2 is around08:11
mborzeckihttps://paste.ubuntu.com/p/xy5jWPrNCX/08:11
mborzeckihmm /usr/lib/snapd/snap-gdb-shim: /lib/x86_64-linux-gnu/libc.so.6: version `GLIBC_2.34' not found (required by /usr/lib/snapd/snap-gdb-shim)08:15
mborzeckiok, looks like it's just failing like this on 21.1008:16
mborzeckimvo: we have a problem on 21.10, looks like the binaries that are built there no longer work when invoked in core16 base08:22
mvomborzecki: in a meeting right now, sry, will look in a bit 08:34
mvomborzecki: can I squash 10540 btw?08:35
mborzeckimvo: yes08:37
mupPR snapd#10661 closed: cmd/libsnap-confine-private: device cgroup v2 support <Complex> <cgroupv2> <Created by bboozzoo> <Merged by mvo5> <https://github.com/snapcore/snapd/pull/10661>08:37
mupPR snapd#10540 closed: cmd/snap-confine: handle CURRENT_TAGS on systems that support it <Squash-merge> <Created by bboozzoo> <Merged by mvo5> <https://github.com/snapcore/snapd/pull/10540>08:47
mborzeckioh, there was no conflict?08:50
mupPR snapd#10773 closed: interfaces/builtin: fix microstack unit tests on distros using /usr/libexec <Simple 😃> <Skip spread> <Created by bboozzoo> <Merged by mvo5> <https://github.com/snapcore/snapd/pull/10773>08:52
mupPR snapd#10628 closed: usersession/xdgopenproxy: move PortalLauncher class to own package <Squash-merge> <Created by mardy> <Merged by mvo5> <https://github.com/snapcore/snapd/pull/10628>08:57
mborzeckiok, my ride has arrived, bbiab09:14
mupPR snapd#10759 closed: tests: be more robust against a new day stepping in <Squash-merge> <Created by mardy> <Merged by mvo5> <https://github.com/snapcore/snapd/pull/10759>10:07
mupPR snapd#10764 closed: tests: increase memory quota in quota-groups-systemd-accounting <Squash-merge> <Created by mardy> <Merged by mvo5> <https://github.com/snapcore/snapd/pull/10764>10:12
mborzeckire10:18
mborzeckiheh, one more debian/rules tweak is apparently needed10:24
mvomborzecki: meh, hopefully the last one :)10:27
mardyhas anyone seen a similar spread failure on tests/main/security-device-cgroups:kmsg? https://paste.ubuntu.com/p/nJ7z2wxrKX/10:34
mborzeckiagain a mystery, why didn't this come up in our builds10:35
mvomborzecki: strange, we even have the sbuild test to make sure we test as closely to the buildds as possible :/10:40
mborzeckimvo: but it's nightly, so maybe it's failing?10:41
mborzeckimvo: and it runs on debian only :)10:43
mupPR snapd#10774 opened: asserts, snapstate: return full validation set keys from CheckPresenceRequired and CheckPresenceInvalid <Needs Samuele review> <validation-sets :white_check_mark:> <Created by stolowski> <https://github.com/snapcore/snapd/pull/10774>10:48
mborzeckimvo: well, i know, we dont' run tests when building the package ;)10:50
mvomborzecki: meh, ok10:58
mardyso, this looks weird: https://github.com/snapcore/snapd/pull/10739/checks?check_run_id=359687464911:04
mupPR #10739: mount-control: step 2 <Needs Samuele review> <Needs security review> <Created by mardy> <https://github.com/snapcore/snapd/pull/10739>11:04
mardythe test tests/main/security-device-cgroups:uinput was run successfully, but it didn't issue a REBOOT11:05
mardyso the udev rules were not cleaned up, and tests/main/security-device-cgroups:kmsg failed because of that11:05
mupPR snapd#10775 opened: packaging/ubuntu: pass GO111MODULE to dh_auto_test <Simple 😃> <Created by bboozzoo> <https://github.com/snapcore/snapd/pull/10775>11:08
mborzeckihttps://github.com/snapcore/snapd/pull/10703 needs reviews, it's pretty fun with some python bits11:09
mupPR #10703:  tests/main/security-device-cgroups-strict-enforced: demonstrate device cgroup being enforced <cgroupv2> <Created by bboozzoo> <https://github.com/snapcore/snapd/pull/10703>11:09
mupPR snapd#10776 opened: cmd/libsnap-confine-private, tests, sandbox: remove warnings about cgroup v2, drop forced devmode <Simple 😃> <Created by bboozzoo> <https://github.com/snapcore/snapd/pull/10776>11:43
mardymborzecki: reviewed!11:44
mborzeckithanks, i'll take a look in a bit11:44
mborzecki10766 is also fun and simple11:45
mardycachio: hi! I have a spread failure which I cannot understand; I'll paste the same messages that I sent to the channel in private message, then we can continue here (when you have time)11:45
mardymborzecki: wrong PR number? 10766 is already merged11:47
mborzeckimardy: 10776 :)11:47
mardymborzecki: +111:54
mupPR snapd#10777 opened: interfaces/modem-manager: add access to PCIe modems <Created by alfonsosanchezbeato> <https://github.com/snapcore/snapd/pull/10777>13:18
mupPR snapd#10778 opened: cmd: build gdb shims as static binaries <Simple 😃> <Created by bboozzoo> <https://github.com/snapcore/snapd/pull/10778>14:43
mborzeckimvo: ^^14:44
mvomborzecki: nice!14:44
mborzeckiadds about 1.7MB to the overall uncompressed size14:45
* cachio_ afk14:46
mborzeckimaybe we could somehow handle all of the shim business in a single binary and add a symlink eg. snap-gdbserver-shim -> snap-gdb-shim14:46
mvomborzecki: +114:48
* mvo needs to switch network14:48
ijohnson[m]@bboozzoo hmm regarding docker, is your cgroupsv2 change effectively the case that snaps now always enter into a device cgroup whenever snap-confine runs? Remember we had the behavior before where snaps are not put into cgroups unless there is an interface which declares rules to tag devices for that snap15:10
zyga-mbpoh15:10
zyga-mbpI remember that15:10
zyga-mbpI caused a regression a while abck15:10
zyga-mbpremember?15:10
zyga-mbpit looked as an optimization but it broke docker 15:11
ijohnson[m]yeah like greengrass relies on this behavior15:11
ijohnson[m]I think it also broke docker for the same reasons ?15:11
mborzeckiijohnson: it's still the same, a piece of the log from when docker fails to launch antything is here: https://paste.ubuntu.com/p/xy5jWPrNCX/15:13
ijohnson[m]thanks I'll take a look15:14
ijohnson[m]the cupsd apparmor denials are nothing new, I don't know why but docker always seems to want to ptrace cups, but that's nothing new15:15
mborzeckiit seems like it tries to launch a new scope, but cannot talk to systemd for some reason15:15
ijohnson[m]@bboozoo, if I clone your branch can I reproduce this in gCE with the 21.10 image that has cgroupsv2 enabled ?15:16
mborzeckiperhaps that's a new bit that isn't covered by the interace yet15:16
ijohnson[m]could be15:16
ijohnson[m]@bboozzoo are there any other denials ?15:16
mborzeckiijohnson: use this branch  https://github.com/snapcore/snapd/pull/1057515:16
mupPR #10575: [WIP] many: device cgroup v2 support <â›” Blocked> <cgroupv2> <Created by bboozzoo> <https://github.com/snapcore/snapd/pull/10575>15:16
mborzeckithere's ubuntu-21.10-64-cgroupv2 system defined in spread which uses the right image15:17
ijohnson[m]ack15:18
mborzeckihm there's nothing dbus related in the docker-support interface15:19
ijohnson[m]that could be it for sure then15:20
jdstrandijohnson[m]: it isn't that docker is trying to ptrace cupsd, it is trying to do something akin to 'ps', hitting stuff in /proc that requires the profile to have 'ptrace read peer=/usr/sbin15:23
jdstrand /cupsd'15:23
ijohnson[m]jdstrand: ah sure, and cupsd is just unique in that it also happens to have it's own apparmor profile rather than be unconfined15:23
ijohnson[m]?15:23
jdstrandie, it is looking at everything in /proc/[0-9]* 15:23
jdstrandyes. chronyd too and anything else that would've happened to be running15:24
jdstrand(under a profile)15:24
ijohnson[m]ah yeah I think I have seen chronyd too as well15:24
jdstrands/profile/profile other than unconfined/15:24
jdstrandyou have, it is in that paste :)15:24
jdstrandthe denial is noisy but harmless. docker doesn't need info on cupsd or chronyd15:25
ijohnson[m]right15:26
jdstrandif you did add a 'ptrace read,' rule (which you shouldn't ;), then those other profiles would need a corresponding 'ptrace readby peer=snap.docker.dockerd' rule15:26
ijohnson[m]oh haha yeah it is in that paste too15:26
jdstrandthe consensus back when was to have quiet profile flags and quiet rules. eg, people could hit some 'snap set' command for the system to turn off denials for a snap, that would add a profile flag to the profile and everyone rejoices. amurray would be able to give the more details in this area15:28
ijohnson[m]yeah I think that would be a great feature to have some day15:29
jdstrandiirc, apparmor 3.1 was going to have the quiet profile flag and perhaps that could be backported into the vendored apparmor he is/has worked on15:29
jdstrand(or just pull 3.1 in)15:29
ijohnson[m]Yes, the apparmor vendoring is coming along I think I've reviewed that PR a few times now15:30
jdstrand\o/15:30
jdstrandthat's going to be *wonderful* :)15:30
ijohnson[m]:-)15:30
* ijohnson[m] needs to afk for a bit15:31
jdstrandijohnson[m]: nice chatting with you; hope you're well :)15:31
ijohnson[m]thanks you too!15:32
zyga-mbphey jdstrand :)15:34
zyga-mbpit's fantastic to see you here again15:34
mupPR snapd#10767 closed: o/snapstate: only conflict with runnable and relevant tasks <Needs Samuele review> <Created by MiguelPires> <Closed by MiguelPires> <https://github.com/snapcore/snapd/pull/10767>15:48
mupPR snapd#10775 closed: packaging/ubuntu: pass GO111MODULE to dh_auto_test <Simple 😃> <Created by bboozzoo> <Merged by mvo5> <https://github.com/snapcore/snapd/pull/10775>16:19
mupPR snapd#10776 closed: cmd/libsnap-confine-private, tests, sandbox: remove warnings about cgroup v2, drop forced devmode <Simple 😃> <Created by bboozzoo> <Merged by mvo5> <https://github.com/snapcore/snapd/pull/10776>16:19
ijohnson[m]bboozzoo: yeah so there are a bunch of dbus denials for docker when run under cgroupsv2 on ubuntu like this16:54
ijohnson[m]https://paste.ubuntu.com/p/Jt9sGC5SZG/16:54
mupPR snapd#10779 opened: tests/nested/manual: use loop for checking for initialize-system task done <Simple 😃> <Run nested> <Created by anonymouse64> <https://github.com/snapcore/snapd/pull/10779>17:59

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!