Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

kola-denylist: Add a few ext.config.shared.networking #1095

Merged
merged 1 commit into from
Dec 13, 2022

Conversation

cgwalters
Copy link
Member

These are all root caused to injecting networking-related kargs triggers a selinux denial in systemd-network-generator:

[    4.171674] audit: type=1400 audit(1670858949.421:4): avc:  denied  { add_name } for  pid=1214 comm="systemd-network" name="90-eth1.network" scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=dir permissive=0

This is fixed in c9s, and I think the fix is
fedora-selinux/selinux-policy@c86d943

I don't think the denial here is fatal though for our use case, it's only about writing networkd files which we don't use.

These are all root caused to injecting networking-related kargs
triggers a selinux denial in `systemd-network-generator`:

```
[    4.171674] audit: type=1400 audit(1670858949.421:4): avc:  denied  { add_name } for  pid=1214 comm="systemd-network" name="90-eth1.network" scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=dir permissive=0
```

This is fixed in c9s, and I think the fix is
fedora-selinux/selinux-policy@c86d943

I don't think the denial here is fatal though for our use case,
it's only about writing networkd files which we don't use.
@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Dec 12, 2022
Copy link
Member

@jlebon jlebon left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

OK right, and the reason why we can't disable the service entirely is because we may still need parts of it (coreos/fedora-coreos-tracker#1059 (comment)).

- pattern: ext.config.shared.networking.force-persist-ip
tracker: https://github.com/fedora-selinux/selinux-policy/commit/c86d943538f907c2e6b20ffda0a8d2b5b5bd2e34
osversion:
- rhel-9.0
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Let's snooze them until e.g. mid-January? Snoozing isn't the best UX, but it's a crude way to ensure we don't keep disabling those tests well past when they're no longer needed.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't think the tests will ever pass in rhel 9.0. Note the dot-zero.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In that case, I think ideally these tests should be skipped on RHEL 9.0 entirely. We have distros, but I don't think we can limit per version yet, but it could make sense to add.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Agree, though in practice what I think will happen is that we branch and main/master retargets for 9.2 at some point where this is already fixed.

Another way to say this is - the tests should automatically be un-denied when we retarget, which is the main goal.

@cgwalters
Copy link
Member Author

(This needs a /lgtm)

@jlebon
Copy link
Member

jlebon commented Dec 12, 2022

/lgtm

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Dec 12, 2022
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Dec 12, 2022

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: cgwalters, jlebon

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci-robot
Copy link

/retest-required

Remaining retests: 0 against base HEAD 1cb9a53 and 2 for PR HEAD 3f16c1a in total

@cgwalters
Copy link
Member Author

/override ci/prow/scos-9-build-test-qemu

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Dec 12, 2022

@cgwalters: Overrode contexts on behalf of cgwalters: ci/prow/scos-9-build-test-qemu

In response to this:

/override ci/prow/scos-9-build-test-qemu

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@travier
Copy link
Member

travier commented Dec 13, 2022

/lgtm
/override ci/prow/scos-9-build-test-qemu

@travier
Copy link
Member

travier commented Dec 13, 2022

/override ci/prow/scos-9-build-test-qemu

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Dec 13, 2022

@travier: Overrode contexts on behalf of travier: ci/prow/scos-9-build-test-qemu

In response to this:

/override ci/prow/scos-9-build-test-qemu

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Dec 13, 2022

@cgwalters: all tests passed!

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. lgtm Indicates that a PR is ready to be merged.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

5 participants