* [PATCH 0/6] debian / libvirt / devconfig fixes
@ 2025-03-23 11:50 Luis Chamberlain
2025-03-23 11:50 ` [PATCH 1/6] scripts/bringup_guestfs.sh: uninstall unattended-upgrades on debian guests Luis Chamberlain
` (5 more replies)
0 siblings, 6 replies; 12+ messages in thread
From: Luis Chamberlain @ 2025-03-23 11:50 UTC (permalink / raw)
To: kdevops; +Cc: Luis Chamberlain
Here are a few enhancements to debian guests so to ensure we remove
the unattended-upgrades package from the start so to prevent tons of
silly issues it can create.
The next set of changes are related to the confusing way in which we
define the kdevops storage pool path in one way in kconfig but use it
differently in yaml / ansible. This then phases out a few commands from
shell into ansible and adds sanity checks back, this shows how using
ansible can be more precise.
Lastly, there's one generic fix for devconfig so we ensure we don't use
dashes on the kdevops host prefix.
Luis Chamberlain (6):
scripts/bringup_guestfs.sh: uninstall unattended-upgrades on debian
guests
devconfig: ensure unattended-upgrades is not installed on debian
libvirt: use consistent pool path variables and use optional yaml
output
Kconfig: adopt output yaml for KDEVOPS_FIRST_RUN
guestfs: add ansible group permisison check on libvirt system uri
gen_nodes: ensure kdevops prefix has no dashes
Kconfig | 1 +
kconfigs/Kconfig.guestfs | 15 +++++
kconfigs/Kconfig.libvirt | 11 +++-
.../roles/bringup_guestfs/tasks/main.yml | 59 +++++++++++++++++++
.../tasks/install-deps/debian/main.yml | 22 +++++++
playbooks/roles/gen_nodes/tasks/main.yml | 5 ++
scripts/bringup_guestfs.sh | 6 +-
scripts/bringup_vagrant.sh | 2 +-
scripts/destroy_guestfs.sh | 2 +-
scripts/destroy_vagrant.sh | 2 +-
scripts/gen-nodes.Makefile | 6 --
scripts/guestfs.Makefile | 9 +--
scripts/prune_stale_vagrant.sh | 2 +-
scripts/vagrant.Makefile | 5 --
14 files changed, 120 insertions(+), 27 deletions(-)
--
2.47.2
^ permalink raw reply [flat|nested] 12+ messages in thread* [PATCH 1/6] scripts/bringup_guestfs.sh: uninstall unattended-upgrades on debian guests 2025-03-23 11:50 [PATCH 0/6] debian / libvirt / devconfig fixes Luis Chamberlain @ 2025-03-23 11:50 ` Luis Chamberlain 2025-03-23 11:50 ` [PATCH 2/6] devconfig: ensure unattended-upgrades is not installed on debian Luis Chamberlain ` (4 subsequent siblings) 5 siblings, 0 replies; 12+ messages in thread From: Luis Chamberlain @ 2025-03-23 11:50 UTC (permalink / raw) To: kdevops; +Cc: Luis Chamberlain Be sure to remove unattended-upgrades when taking the downloaded image from Debian to build our base image which we will use to launch guests with. The package unattended-upgrades [0] is one of the biggest pain points for continous integeration on kdevops, where we race against package installations being mucked behind our back. So let's just be extremely vocal about it being a requirement to not be installed on debian systems and complain and ensure systems don't have it. Even though we have already in place devconfig rules to remove it, upon first bringup you can still race against it! If you do have an old guest with it, you should just remove the old guest and re-do your new guest as otherwise you will encounter many odd silly bugs and the issue is just races with debian doing its upgrades with unattended-upgrades. To my surprise unattended-upgrades has also been a default on debian for years now, it would seem we can just move to a debian image of "netinst" or "minimal" images but that requires more work than what we can just do by removing the package. Long term we really should request to see if is debian folks can ends up packaging a proper guestfs image based on debian testing for us, and when that does happen we ask it does not have unattended-upgrades. [0] https://wiki.debian.org/UnattendedUpgrades Signed-off-by: Luis Chamberlain <mcgrof@kernel.org> --- scripts/bringup_guestfs.sh | 1 + 1 file changed, 1 insertion(+) diff --git a/scripts/bringup_guestfs.sh b/scripts/bringup_guestfs.sh index 7166842307b5..1ba2c8c6ff9a 100755 --- a/scripts/bringup_guestfs.sh +++ b/scripts/bringup_guestfs.sh @@ -223,6 +223,7 @@ firstboot-command systemctl stop ssh firstboot-command DEBIAN_FRONTEND=noninteractive DEBCONF_NONINTERACTIVE_SEEN=true dpkg-reconfigure -p low --force openssh-server firstboot-command systemctl start ssh firstboot-command apt update && apt upgrade --yes +uninstall unattended-upgrades _EOT # CONFIG_GUESTFS_COPY_SOURCES_FROM_HOST_TO_GUEST will not work # if /etc/nsswitch.conf has a line like this: -- 2.47.2 ^ permalink raw reply related [flat|nested] 12+ messages in thread
* [PATCH 2/6] devconfig: ensure unattended-upgrades is not installed on debian 2025-03-23 11:50 [PATCH 0/6] debian / libvirt / devconfig fixes Luis Chamberlain 2025-03-23 11:50 ` [PATCH 1/6] scripts/bringup_guestfs.sh: uninstall unattended-upgrades on debian guests Luis Chamberlain @ 2025-03-23 11:50 ` Luis Chamberlain 2025-03-23 11:50 ` [PATCH 3/6] libvirt: use consistent pool path variables and use optional yaml output Luis Chamberlain ` (3 subsequent siblings) 5 siblings, 0 replies; 12+ messages in thread From: Luis Chamberlain @ 2025-03-23 11:50 UTC (permalink / raw) To: kdevops; +Cc: Luis Chamberlain We already remove the package on debian bringups when downloading a an official but-not-guestfs-official (and so debian custom) image to build our base images for our guests. Now that we have that stop-gap measure, be sure we just fail if the package happens to be installed, and complain to the user about it. We can easily fix this with just two command so recommend that. Signed-off-by: Luis Chamberlain <mcgrof@kernel.org> --- .../tasks/install-deps/debian/main.yml | 22 +++++++++++++++++++ 1 file changed, 22 insertions(+) diff --git a/playbooks/roles/devconfig/tasks/install-deps/debian/main.yml b/playbooks/roles/devconfig/tasks/install-deps/debian/main.yml index 5624a9f8406a..954f0aede3b2 100644 --- a/playbooks/roles/devconfig/tasks/install-deps/debian/main.yml +++ b/playbooks/roles/devconfig/tasks/install-deps/debian/main.yml @@ -1,4 +1,26 @@ --- +- name: Check if unattended-upgrades is installed + command: dpkg-query -W -f='${Status}' unattended-upgrades + register: unattended_upgrade_status + ignore_errors: true + changed_when: false + +- name: Set fact if unattended-upgrades is installed + set_fact: + unattended_upgrades_installed: "{{ 'install ok installed' in unattended_upgrade_status.stdout }}" + +- name: Verify unattended-upgrades is not installed + fail: + msg: | + The unattended-upgrades package is installed on the base image, this + can cause tons of issues with CIs. Fix this by running the following + commands: + + make cleancache + make bringup + when: + - unattended_upgrades_installed|bool + - name: Upgrade Packages become: yes become_method: sudo -- 2.47.2 ^ permalink raw reply related [flat|nested] 12+ messages in thread
* [PATCH 3/6] libvirt: use consistent pool path variables and use optional yaml output 2025-03-23 11:50 [PATCH 0/6] debian / libvirt / devconfig fixes Luis Chamberlain 2025-03-23 11:50 ` [PATCH 1/6] scripts/bringup_guestfs.sh: uninstall unattended-upgrades on debian guests Luis Chamberlain 2025-03-23 11:50 ` [PATCH 2/6] devconfig: ensure unattended-upgrades is not installed on debian Luis Chamberlain @ 2025-03-23 11:50 ` Luis Chamberlain 2025-03-23 11:50 ` [PATCH 4/6] Kconfig: adopt output yaml for KDEVOPS_FIRST_RUN Luis Chamberlain ` (2 subsequent siblings) 5 siblings, 0 replies; 12+ messages in thread From: Luis Chamberlain @ 2025-03-23 11:50 UTC (permalink / raw) To: kdevops; +Cc: Luis Chamberlain Turns out we define CONFIG_KDEVOPS_STORAGE_POOL_PATH only to make it be the same as generic CONFIG_LIBVIRT_STORAGE_POOL_PATH only later to then use the old GUESTFS_ARGS or VAGRANT_ARGS to define the yaml version with a postfix "kdevops". Fix all this mess by using yaml output and cleaing its use up. This does not fix any bugs, it just make things consistent. And so where you saw CONFIG_KDEVOPS_STORAGE_POOL_PATH we now just use the generic version CONFIG_LIBVIRT_STORAGE_POOL_PATH. The kconfig symbol CONFIG_KDEVOPS_STORAGE_POOL_PATH gets promoted to be what we expect it, that is: "{{ libvirt_storage_pool_path }}/kdevops" This also ensure we will barf as we want to promote using ansible for this anyway and do away with all of the CONFIG_KDEVOPS_STORAGE_POOL_PATH uses in shell scripts. This kills all use of CONFIG_KDEVOPS_STORAGE_POOL_PATH from shell scripts too then. The motivation for all this is to slowly trim away the large error-prone script scripts/bringup_guestfs.sh into ansible. This is just a small step towards making that easier. Signed-off-by: Luis Chamberlain <mcgrof@kernel.org> --- kconfigs/Kconfig.guestfs | 5 +++++ kconfigs/Kconfig.libvirt | 11 ++++++++++- scripts/bringup_guestfs.sh | 2 +- scripts/bringup_vagrant.sh | 2 +- scripts/destroy_guestfs.sh | 2 +- scripts/destroy_vagrant.sh | 2 +- scripts/gen-nodes.Makefile | 6 ------ scripts/guestfs.Makefile | 7 +------ scripts/prune_stale_vagrant.sh | 2 +- scripts/vagrant.Makefile | 5 ----- 10 files changed, 21 insertions(+), 23 deletions(-) diff --git a/kconfigs/Kconfig.guestfs b/kconfigs/Kconfig.guestfs index f618fc30fe25..c6d2d1907dd5 100644 --- a/kconfigs/Kconfig.guestfs +++ b/kconfigs/Kconfig.guestfs @@ -1,5 +1,10 @@ if GUESTFS +config STORAGE_POOL_PATH + string + output yaml + default LIBVIRT_STORAGE_POOL_PATH + config GUESTFS_HAS_CUSTOM_RAW_IMAGE bool diff --git a/kconfigs/Kconfig.libvirt b/kconfigs/Kconfig.libvirt index 1ed967423096..cba8abf1e24b 100644 --- a/kconfigs/Kconfig.libvirt +++ b/kconfigs/Kconfig.libvirt @@ -155,13 +155,20 @@ config LIBVIRT_QEMU_GROUP default "qemu" if !DISTRO_DEBIAN && !DISTRO_UBUNTU default "libvirt-qemu" if DISTRO_DEBIAN || DISTRO_UBUNTU -config KDEVOPS_STORAGE_POOL_PATH + +config LIBVIRT_STORAGE_POOL_PATH string + output yaml default LIBVIRT_STORAGE_POOL_PATH_AUTO if LIBVIRT && !LIBVIRT_STORAGE_POOL_PATH_CUSTOM_MANUAL default LIBVIRT_STORAGE_POOL_PATH_AUTO if LIBVIRT && LIBVIRT_STORAGE_POOL_PATH_CUSTOM_CWD default LIBVIRT_STORAGE_POOL_PATH_CUSTOM if LIBVIRT && LIBVIRT_STORAGE_POOL_PATH_CUSTOM_MANUAL default VIRTUALBOX_STORAGE_POOL_PATH_CUSTOM if VAGRANT_VIRTUALBOX +config KDEVOPS_STORAGE_POOL_PATH + string + output yaml + default "{{ libvirt_storage_pool_path }}/kdevops" + config QEMU_BIN_PATH string default QEMU_BIN_PATH_LIBVIRT if LIBVIRT @@ -1052,6 +1059,7 @@ endif config LIBVIRT_STORAGE_POOL_CREATE bool "Should we build a custom storage pool for you?" + output yaml default n if !LIBVIRT_STORAGE_POOL_PATH_INFER_ADVANCED default $(shell, ./scripts/get_libvirsh_pool_enabled.sh) if LIBVIRT_STORAGE_POOL_PATH_INFER_ADVANCED help @@ -1063,6 +1071,7 @@ config LIBVIRT_STORAGE_POOL_CREATE config LIBVIRT_STORAGE_POOL_NAME string "Libvirt storage pool name" + output yaml depends on LIBVIRT_STORAGE_POOL_CREATE default "default" if !LIBVIRT_STORAGE_POOL_PATH_INFER_ADVANCED default $(shell, ./scripts/get_libvirsh_pool_name.sh) if LIBVIRT_STORAGE_POOL_PATH_INFER_ADVANCED diff --git a/scripts/bringup_guestfs.sh b/scripts/bringup_guestfs.sh index 1ba2c8c6ff9a..976d1e78ed6a 100755 --- a/scripts/bringup_guestfs.sh +++ b/scripts/bringup_guestfs.sh @@ -14,7 +14,7 @@ IMG_FMT="qcow2" if [ "${CONFIG_LIBVIRT_EXTRA_DRIVE_FORMAT_RAW}" = "y" ]; then IMG_FMT="raw" fi -STORAGETOPDIR="${CONFIG_KDEVOPS_STORAGE_POOL_PATH}" +STORAGETOPDIR="${CONFIG_LIBVIRT_STORAGE_POOL_PATH}" STORAGEDIR="${STORAGETOPDIR}/kdevops/guestfs" QEMU_GROUP=$CONFIG_LIBVIRT_QEMU_GROUP GUESTFSDIR="${TOPDIR}/guestfs" diff --git a/scripts/bringup_vagrant.sh b/scripts/bringup_vagrant.sh index 4d30c2312000..4e163871d482 100755 --- a/scripts/bringup_vagrant.sh +++ b/scripts/bringup_vagrant.sh @@ -55,7 +55,7 @@ vagrant_check_dups() # instances *and* we know one does not exist in another # directory for this user. - kdevops_pool_path="$CONFIG_KDEVOPS_STORAGE_POOL_PATH" + kdevops_pool_path="$CONFIG_LIBVIRT_STORAGE_POOL_PATH" # For libvirt we can do one more global sanity check if [[ "$CONFIG_LIBVIRT" == "y" ]]; then possible_image="${kdevops_pool_path}/vagrant_${instance}.img" diff --git a/scripts/destroy_guestfs.sh b/scripts/destroy_guestfs.sh index 58dca78d85cf..ee5dc2b57d6d 100755 --- a/scripts/destroy_guestfs.sh +++ b/scripts/destroy_guestfs.sh @@ -7,7 +7,7 @@ source ${TOPDIR}/scripts/lib.sh export LIBVIRT_DEFAULT_URI=$CONFIG_LIBVIRT_URI -STORAGEDIR="${CONFIG_KDEVOPS_STORAGE_POOL_PATH}/kdevops/guestfs" +STORAGEDIR="${CONFIG_LIBVIRT_STORAGE_POOL_PATH}/kdevops/guestfs" GUESTFSDIR="${TOPDIR}/guestfs" if [ -f "$GUESTFSDIR/kdevops_nodes.yaml" ]; then diff --git a/scripts/destroy_vagrant.sh b/scripts/destroy_vagrant.sh index 4e5bb9d64bef..bd5e43d0044e 100755 --- a/scripts/destroy_vagrant.sh +++ b/scripts/destroy_vagrant.sh @@ -18,7 +18,7 @@ rm -rf .vagrant # doing so we don't check for global dups or anything like that. UNINIT_CURRENT_INSTANCES=$(vagrant status --machine-readable | grep ",state," | grep not_created | awk -F "," '{print $2}') for i in $UNINIT_CURRENT_INSTANCES; do - UNINIT_INSTANCE_SPARE_DRIVE_DIR="${CONFIG_KDEVOPS_STORAGE_POOL_PATH}/kdevops/$i" + UNINIT_INSTANCE_SPARE_DRIVE_DIR="${CONFIG_LIBVIRT_STORAGE_POOL_PATH}/kdevops/$i" if [[ -d $UNINIT_INSTANCE_SPARE_DRIVE_DIR ]]; then echo "Found unitialized (possibly old) instance spare drive directory, removing it ... $i" rm -rf $UNINIT_INSTANCE_SPARE_DRIVE_DIR diff --git a/scripts/gen-nodes.Makefile b/scripts/gen-nodes.Makefile index 8bee2db57591..775ec5c49808 100644 --- a/scripts/gen-nodes.Makefile +++ b/scripts/gen-nodes.Makefile @@ -42,12 +42,6 @@ GEN_NODES_EXTRA_ARGS += libvirt_session_management_network_device='$(subst ",,$( GEN_NODES_EXTRA_ARGS += libvirt_session_public_network_dev='$(subst ",,$(CONFIG_LIBVIRT_SESSION_PUBLIC_NETWORK_DEV))' endif -ifeq (y,$(CONFIG_LIBVIRT_STORAGE_POOL_CREATE)) -GEN_NODES_EXTRA_ARGS += libvirt_storage_pool_create='True' -GEN_NODES_EXTRA_ARGS += libvirt_storage_pool_name='$(subst ",,$(CONFIG_LIBVIRT_STORAGE_POOL_NAME))' -GEN_NODES_EXTRA_ARGS += libvirt_storage_pool_path='$(subst ",,$(CONFIG_KDEVOPS_STORAGE_POOL_PATH))' -endif - GEN_NODES_EXTRA_ARGS += libvirt_extra_storage_aio_mode='$(subst ",,$(CONFIG_LIBVIRT_AIO_MODE))' GEN_NODES_EXTRA_ARGS += libvirt_extra_storage_aio_cache_mode='$(subst ",,$(CONFIG_LIBVIRT_AIO_CACHE_MODE))' diff --git a/scripts/guestfs.Makefile b/scripts/guestfs.Makefile index 8b1b4e9fc7d5..d08e697f3cfb 100644 --- a/scripts/guestfs.Makefile +++ b/scripts/guestfs.Makefile @@ -18,11 +18,6 @@ QEMU_GROUP:=$(subst ",,$(CONFIG_LIBVIRT_QEMU_GROUP)) GUESTFS_ARGS += kdevops_storage_pool_group='$(QEMU_GROUP)' GUESTFS_ARGS += storage_pool_group='$(QEMU_GROUP)' -STORAGE_POOL_PATH:=$(subst ",,$(CONFIG_KDEVOPS_STORAGE_POOL_PATH)) -KDEVOPS_STORAGE_POOL_PATH:=$(STORAGE_POOL_PATH)/kdevops -GUESTFS_ARGS += storage_pool_path=$(STORAGE_POOL_PATH) -GUESTFS_ARGS += kdevops_storage_pool_path=$(KDEVOPS_STORAGE_POOL_PATH) - 9P_HOST_CLONE := ifeq (y,$(CONFIG_BOOTLINUX_9P)) 9P_HOST_CLONE := 9p_linux_clone @@ -109,4 +104,4 @@ destroy_guestfs: PHONY += destroy_guestfs cleancache: - $(Q)rm -f $(subst ",,$(CONFIG_KDEVOPS_STORAGE_POOL_PATH))/kdevops/guestfs/base_images/* + $(Q)rm -f $(subst ",,$(CONFIG_LIBVIRT_STORAGE_POOL_PATH))/kdevops/guestfs/base_images/* diff --git a/scripts/prune_stale_vagrant.sh b/scripts/prune_stale_vagrant.sh index 95b88911c0a6..61ac0e86b6c2 100755 --- a/scripts/prune_stale_vagrant.sh +++ b/scripts/prune_stale_vagrant.sh @@ -37,7 +37,7 @@ if [[ "$CONFIG_LIBVIRT" != "y" ]]; then fi if [[ $# -eq 0 ]]; then - KDEVOPS_POOL_PATH="$CONFIG_KDEVOPS_STORAGE_POOL_PATH" + KDEVOPS_POOL_PATH="$CONFIG_LIBVIRT_STORAGE_POOL_PATH" elif [[ $# -eq 1 ]]; then if [[ "$1" == "--help" ]]; then echo "Usage: $0" diff --git a/scripts/vagrant.Makefile b/scripts/vagrant.Makefile index 368c2f84aa89..664c8f9cfc5c 100644 --- a/scripts/vagrant.Makefile +++ b/scripts/vagrant.Makefile @@ -44,11 +44,6 @@ ifeq (y,$(CONFIG_VAGRANT_VIRTUALBOX)) VAGRANT_ARGS += virtualbox_provider=True endif -STORAGE_POOL_PATH:=$(subst ",,$(CONFIG_KDEVOPS_STORAGE_POOL_PATH)) -KDEVOPS_STORAGE_POOL_PATH:=$(STORAGE_POOL_PATH)/kdevops -VAGRANT_ARGS += storage_pool_path=$(STORAGE_POOL_PATH) -VAGRANT_ARGS += kdevops_storage_pool_path=$(KDEVOPS_STORAGE_POOL_PATH) - VAGRANT_9P_HOST_CLONE := ifeq (y,$(CONFIG_BOOTLINUX_9P)) VAGRANT_9P_HOST_CLONE := vagrant_9p_linux_clone -- 2.47.2 ^ permalink raw reply related [flat|nested] 12+ messages in thread
* [PATCH 4/6] Kconfig: adopt output yaml for KDEVOPS_FIRST_RUN 2025-03-23 11:50 [PATCH 0/6] debian / libvirt / devconfig fixes Luis Chamberlain ` (2 preceding siblings ...) 2025-03-23 11:50 ` [PATCH 3/6] libvirt: use consistent pool path variables and use optional yaml output Luis Chamberlain @ 2025-03-23 11:50 ` Luis Chamberlain 2025-03-23 11:50 ` [PATCH 5/6] guestfs: add ansible group permisison check on libvirt system uri Luis Chamberlain 2025-03-23 11:50 ` [PATCH 6/6] gen_nodes: ensure kdevops prefix has no dashes Luis Chamberlain 5 siblings, 0 replies; 12+ messages in thread From: Luis Chamberlain @ 2025-03-23 11:50 UTC (permalink / raw) To: kdevops; +Cc: Luis Chamberlain This will be used later. Signed-off-by: Luis Chamberlain <mcgrof@kernel.org> --- Kconfig | 1 + 1 file changed, 1 insertion(+) diff --git a/Kconfig b/Kconfig index 357341be108d..988782a9dc83 100644 --- a/Kconfig +++ b/Kconfig @@ -30,6 +30,7 @@ config NEEDS_LOCAL_DEVELOPMENT_PATH config KDEVOPS_FIRST_RUN bool "Is this your first time running kdevops on this system?" + output yaml default n help When you run kdevops for the first time we can enable options -- 2.47.2 ^ permalink raw reply related [flat|nested] 12+ messages in thread
* [PATCH 5/6] guestfs: add ansible group permisison check on libvirt system uri 2025-03-23 11:50 [PATCH 0/6] debian / libvirt / devconfig fixes Luis Chamberlain ` (3 preceding siblings ...) 2025-03-23 11:50 ` [PATCH 4/6] Kconfig: adopt output yaml for KDEVOPS_FIRST_RUN Luis Chamberlain @ 2025-03-23 11:50 ` Luis Chamberlain 2025-03-25 14:53 ` Daniel Gomez 2025-03-23 11:50 ` [PATCH 6/6] gen_nodes: ensure kdevops prefix has no dashes Luis Chamberlain 5 siblings, 1 reply; 12+ messages in thread From: Luis Chamberlain @ 2025-03-23 11:50 UTC (permalink / raw) To: kdevops; +Cc: Luis Chamberlain The bringup process for libvirt system URI support (not session), so all debian based distros, requieres us to be paranoid about the permissions of our storage directory where we place our libvirt storage pool, and guestfs images. We used to be stupid and were hammering with a sledge hammer a crazy sudo chown -R on a target storage path. That was removed by commit c31459dc384c ("scripts/bringup_guestfs.sh: fix silly directory permission fix"). I rushed that change in because it was affecting live systems and we needed to get testing moving. This adds some sanity checks which don't do the crazy wild permission checks, it will just fail if the permissions are not right. Signed-off-by: Luis Chamberlain <mcgrof@kernel.org> --- kconfigs/Kconfig.guestfs | 10 ++++ .../roles/bringup_guestfs/tasks/main.yml | 59 +++++++++++++++++++ scripts/bringup_guestfs.sh | 3 - scripts/guestfs.Makefile | 2 +- 4 files changed, 70 insertions(+), 4 deletions(-) diff --git a/kconfigs/Kconfig.guestfs b/kconfigs/Kconfig.guestfs index c6d2d1907dd5..d309436fa7c9 100644 --- a/kconfigs/Kconfig.guestfs +++ b/kconfigs/Kconfig.guestfs @@ -5,6 +5,16 @@ config STORAGE_POOL_PATH output yaml default LIBVIRT_STORAGE_POOL_PATH +config GUESTFS_STORAGE_DIR + string + output yaml + default "{{ kdevops_storage_pool_path }}/kdevops/guestfs" + +config GUESTFS_BASE_IMAGE_DIR + string + output yaml + default "{{ guestfs_storage_dir }}/base_images" + config GUESTFS_HAS_CUSTOM_RAW_IMAGE bool diff --git a/playbooks/roles/bringup_guestfs/tasks/main.yml b/playbooks/roles/bringup_guestfs/tasks/main.yml index dcbbaef02522..947d7dbc0b8b 100644 --- a/playbooks/roles/bringup_guestfs/tasks/main.yml +++ b/playbooks/roles/bringup_guestfs/tasks/main.yml @@ -42,6 +42,65 @@ when: guestfs_subdirectories.matched == 0 tags: [ 'config-check' ] +- name: Create kdevops guestfs storage directory if missing (libvirt session uri) + file: + path: "{{ guestfs_base_image_dir }}" + state: directory + mode: '0755' + tags: ['storage-pool-path'] + when: + - 'not libvirt_uri_system|bool' + +- name: Create kdevops guestfs storage directory if missing (libvirt system uri) + become: yes + become_flags: 'su - -c' + become_method: sudo + file: + path: "{{ guestfs_base_image_dir }}" + state: directory + mode: '0775' + group: "{{ libvirt_qemu_group }}" + tags: ['storage-pool-path'] + when: + - 'libvirt_uri_system|bool' + +- name: Check if directory is owned by the correct group (libvirt system uri) + become: yes + become_flags: 'su - -c' + become_method: sudo + command: stat -c '%G' "{{ libvirt_storage_pool_path }}" + register: dir_group + changed_when: false + tags: ['storage-pool-path'] + when: + - 'libvirt_uri_system|bool' + +- name: Check if directory has group write permissions (libvirt system uri) + become: yes + become_flags: 'su - -c' + become_method: sudo + command: stat -c '%A' "{{ libvirt_storage_pool_path }}" + register: dir_perms + changed_when: false + tags: ['storage-pool-path'] + when: + - 'libvirt_uri_system|bool' + +- name: Verify storage pool path directory is group-writable (libvirt system uri) + become: yes + become_flags: 'su - -c' + become_method: sudo + fail: + msg: | + The permissions for {{ libvirt_storage_pool_path }} should be group + writeable by the group used by libvirt: {{ libvirt_qemu_group }} + Current group: {{ dir_group.stdout }} + Current permissions: {{ dir_perms.stdout }} + tags: ['storage-pool-path'] + when: + - 'libvirt_uri_system|bool' + - (dir_group.stdout != libvirt_qemu_group) or (dir_perms.stdout[5] != 'w') + - name: Check for dnsmasq configuration files stat: path: "{{ item }}" diff --git a/scripts/bringup_guestfs.sh b/scripts/bringup_guestfs.sh index 976d1e78ed6a..bc0176f8f5b4 100755 --- a/scripts/bringup_guestfs.sh +++ b/scripts/bringup_guestfs.sh @@ -271,9 +271,6 @@ if [[ "$CONFIG_LIBVIRT_URI_SYSTEM" == "y" ]]; then USE_SUDO="sudo " fi -$USE_SUDO mkdir -p $STORAGEDIR -$USE_SUDO mkdir -p $BASE_IMAGE_DIR - cmdfile=$(mktemp) if [ ! -f $BASE_IMAGE ]; then diff --git a/scripts/guestfs.Makefile b/scripts/guestfs.Makefile index d08e697f3cfb..e1cf25d62d04 100644 --- a/scripts/guestfs.Makefile +++ b/scripts/guestfs.Makefile @@ -83,7 +83,7 @@ bringup_guestfs: $(GUESTFS_BRINGUP_DEPS) playbooks/bringup_guestfs.yml \ -e 'ansible_python_interpreter=/usr/bin/python3' \ --extra-vars=@./extra_vars.yaml \ - --tags config-check,network + --tags config-check,network,storage-pool-path $(Q)$(TOPDIR)/scripts/bringup_guestfs.sh $(Q)ansible-playbook $(ANSIBLE_VERBOSE) --connection=local \ --inventory localhost, \ -- 2.47.2 ^ permalink raw reply related [flat|nested] 12+ messages in thread
* Re: [PATCH 5/6] guestfs: add ansible group permisison check on libvirt system uri 2025-03-23 11:50 ` [PATCH 5/6] guestfs: add ansible group permisison check on libvirt system uri Luis Chamberlain @ 2025-03-25 14:53 ` Daniel Gomez 2025-03-29 21:55 ` Luis Chamberlain 0 siblings, 1 reply; 12+ messages in thread From: Daniel Gomez @ 2025-03-25 14:53 UTC (permalink / raw) To: Luis Chamberlain; +Cc: kdevops On Sun, Mar 23, 2025 at 04:50:08AM +0100, Luis Chamberlain wrote: > The bringup process for libvirt system URI support (not session), > so all debian based distros, requieres us to be paranoid about the > permissions of our storage directory where we place our libvirt > storage pool, and guestfs images. > > We used to be stupid and were hammering with a sledge hammer a crazy > sudo chown -R on a target storage path. That was removed by commit > c31459dc384c ("scripts/bringup_guestfs.sh: fix silly directory permission > fix"). I rushed that change in because it was affecting live systems > and we needed to get testing moving. That commit removes the permissions we don't want to force when host is shared between users. However, the storage pool directory is created with: $USE_SUDO mkdir -p $STORAGEDIR $USE_SUDO mkdir -p $BASE_IMAGE_DIR Which creates the pool directory with sudo command. The commit explains this should result in: Essentially this now does: sudo chown -R foo.libvirt-qemu /path/to/storage/ Which I think is true as these series failed later at the new checks added below with: TASK [bringup_guestfs : Verify storage pool path directory is group-writable (libvirt system uri)] *** fatal: [localhost]: FAILED! => { "changed": false } MSG: The permissions for /xfs1/libvirt should be group writeable by the group used by libvirt: libvirt-qemu Current group: libvirt-qemu Current permissions: drwxr-xr-x Logs: https://github.com/linux-kdevops/kdevops-kpd/actions/runs/14018680385/job/39247654400 Shall we ensure that the pool folder is created with group write permissions? Or why we don't need to do that? It's unclear why the group had 'xr' permissions but not 'w'. Now, I've removed the folder state by pushing some patches for testing. > > This adds some sanity checks which don't do the crazy wild permission > checks, it will just fail if the permissions are not right. > > Signed-off-by: Luis Chamberlain <mcgrof@kernel.org> > --- > kconfigs/Kconfig.guestfs | 10 ++++ > .../roles/bringup_guestfs/tasks/main.yml | 59 +++++++++++++++++++ > scripts/bringup_guestfs.sh | 3 - > scripts/guestfs.Makefile | 2 +- > 4 files changed, 70 insertions(+), 4 deletions(-) > > diff --git a/kconfigs/Kconfig.guestfs b/kconfigs/Kconfig.guestfs > index c6d2d1907dd5..d309436fa7c9 100644 > --- a/kconfigs/Kconfig.guestfs > +++ b/kconfigs/Kconfig.guestfs > @@ -5,6 +5,16 @@ config STORAGE_POOL_PATH > output yaml > default LIBVIRT_STORAGE_POOL_PATH > > +config GUESTFS_STORAGE_DIR > + string > + output yaml > + default "{{ kdevops_storage_pool_path }}/kdevops/guestfs" > + > +config GUESTFS_BASE_IMAGE_DIR > + string > + output yaml > + default "{{ guestfs_storage_dir }}/base_images" > + > config GUESTFS_HAS_CUSTOM_RAW_IMAGE > bool > > diff --git a/playbooks/roles/bringup_guestfs/tasks/main.yml b/playbooks/roles/bringup_guestfs/tasks/main.yml > index dcbbaef02522..947d7dbc0b8b 100644 > --- a/playbooks/roles/bringup_guestfs/tasks/main.yml > +++ b/playbooks/roles/bringup_guestfs/tasks/main.yml > @@ -42,6 +42,65 @@ > when: guestfs_subdirectories.matched == 0 > tags: [ 'config-check' ] > > +- name: Create kdevops guestfs storage directory if missing (libvirt session uri) > + file: > + path: "{{ guestfs_base_image_dir }}" > + state: directory > + mode: '0755' > + tags: ['storage-pool-path'] > + when: > + - 'not libvirt_uri_system|bool' > + > +- name: Create kdevops guestfs storage directory if missing (libvirt system uri) > + become: yes > + become_flags: 'su - -c' > + become_method: sudo > + file: > + path: "{{ guestfs_base_image_dir }}" > + state: directory > + mode: '0775' > + group: "{{ libvirt_qemu_group }}" > + tags: ['storage-pool-path'] > + when: > + - 'libvirt_uri_system|bool' > + > +- name: Check if directory is owned by the correct group (libvirt system uri) > + become: yes > + become_flags: 'su - -c' > + become_method: sudo > + command: stat -c '%G' "{{ libvirt_storage_pool_path }}" > + register: dir_group > + changed_when: false > + tags: ['storage-pool-path'] > + when: > + - 'libvirt_uri_system|bool' > + > +- name: Check if directory has group write permissions (libvirt system uri) > + become: yes > + become_flags: 'su - -c' > + become_method: sudo > + command: stat -c '%A' "{{ libvirt_storage_pool_path }}" > + register: dir_perms > + changed_when: false > + tags: ['storage-pool-path'] > + when: > + - 'libvirt_uri_system|bool' > + > +- name: Verify storage pool path directory is group-writable (libvirt system uri) > + become: yes > + become_flags: 'su - -c' > + become_method: sudo > + fail: > + msg: | > + The permissions for {{ libvirt_storage_pool_path }} should be group > + writeable by the group used by libvirt: {{ libvirt_qemu_group }} > + Current group: {{ dir_group.stdout }} > + Current permissions: {{ dir_perms.stdout }} > + tags: ['storage-pool-path'] > + when: > + - 'libvirt_uri_system|bool' > + - (dir_group.stdout != libvirt_qemu_group) or (dir_perms.stdout[5] != 'w') > + > - name: Check for dnsmasq configuration files > stat: > path: "{{ item }}" > diff --git a/scripts/bringup_guestfs.sh b/scripts/bringup_guestfs.sh > index 976d1e78ed6a..bc0176f8f5b4 100755 > --- a/scripts/bringup_guestfs.sh > +++ b/scripts/bringup_guestfs.sh > @@ -271,9 +271,6 @@ if [[ "$CONFIG_LIBVIRT_URI_SYSTEM" == "y" ]]; then > USE_SUDO="sudo " > fi > > -$USE_SUDO mkdir -p $STORAGEDIR > -$USE_SUDO mkdir -p $BASE_IMAGE_DIR > - > cmdfile=$(mktemp) > > if [ ! -f $BASE_IMAGE ]; then > diff --git a/scripts/guestfs.Makefile b/scripts/guestfs.Makefile > index d08e697f3cfb..e1cf25d62d04 100644 > --- a/scripts/guestfs.Makefile > +++ b/scripts/guestfs.Makefile > @@ -83,7 +83,7 @@ bringup_guestfs: $(GUESTFS_BRINGUP_DEPS) > playbooks/bringup_guestfs.yml \ > -e 'ansible_python_interpreter=/usr/bin/python3' \ > --extra-vars=@./extra_vars.yaml \ > - --tags config-check,network > + --tags config-check,network,storage-pool-path > $(Q)$(TOPDIR)/scripts/bringup_guestfs.sh > $(Q)ansible-playbook $(ANSIBLE_VERBOSE) --connection=local \ > --inventory localhost, \ > -- > 2.47.2 > ^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [PATCH 5/6] guestfs: add ansible group permisison check on libvirt system uri 2025-03-25 14:53 ` Daniel Gomez @ 2025-03-29 21:55 ` Luis Chamberlain 2025-03-29 22:43 ` Luis Chamberlain 0 siblings, 1 reply; 12+ messages in thread From: Luis Chamberlain @ 2025-03-29 21:55 UTC (permalink / raw) To: Daniel Gomez; +Cc: kdevops On Tue, Mar 25, 2025 at 03:53:09PM +0100, Daniel Gomez wrote: > Shall we ensure that the pool folder is created with group write permissions? Yes. That's a needed fix in this series. Luis ^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [PATCH 5/6] guestfs: add ansible group permisison check on libvirt system uri 2025-03-29 21:55 ` Luis Chamberlain @ 2025-03-29 22:43 ` Luis Chamberlain 2025-03-29 22:55 ` Luis Chamberlain 0 siblings, 1 reply; 12+ messages in thread From: Luis Chamberlain @ 2025-03-29 22:43 UTC (permalink / raw) To: Daniel Gomez; +Cc: kdevops On Sat, Mar 29, 2025 at 02:55:27PM -0700, Luis Chamberlain wrote: > On Tue, Mar 25, 2025 at 03:53:09PM +0100, Daniel Gomez wrote: > > Shall we ensure that the pool folder is created with group write permissions? > > Yes. > > That's a needed fix in this series. I'll replace the verify check for system session with just these two tasks way above: - name: Create storage pool path directory if using libvirt session URI file: path: "{{ libvirt_storage_pool_path }}" state: directory mode: "0775" when: libvirt_use_session_uri | default(false) | bool tags: - vars - name: Create storage pool path directory and set group if using libvirt system URI file: path: "{{ libvirt_storage_pool_path }}" state: directory owner: root group: "{{ libvirt_qemu_group }}" mode: "0775" when: not libvirt_use_session_uri | default(false) | bool tags: - vars ^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [PATCH 5/6] guestfs: add ansible group permisison check on libvirt system uri 2025-03-29 22:43 ` Luis Chamberlain @ 2025-03-29 22:55 ` Luis Chamberlain 0 siblings, 0 replies; 12+ messages in thread From: Luis Chamberlain @ 2025-03-29 22:55 UTC (permalink / raw) To: Daniel Gomez; +Cc: kdevops On Sat, Mar 29, 2025 at 03:43:07PM -0700, Luis Chamberlain wrote: > On Sat, Mar 29, 2025 at 02:55:27PM -0700, Luis Chamberlain wrote: > > On Tue, Mar 25, 2025 at 03:53:09PM +0100, Daniel Gomez wrote: > > > Shall we ensure that the pool folder is created with group write permissions? > > > > Yes. > > > > That's a needed fix in this series. > > I'll replace the verify check for system session with just these two > tasks way above: Meh, I mean this (after testing this, I verified the check can stay, as its just a check): diff --git a/playbooks/roles/bringup_guestfs/tasks/main.yml b/playbooks/roles/bringup_guestfs/tasks/main.yml index 947d7dbc0b8b..0b193dad807f 100644 --- a/playbooks/roles/bringup_guestfs/tasks/main.yml +++ b/playbooks/roles/bringup_guestfs/tasks/main.yml @@ -42,6 +42,23 @@ when: guestfs_subdirectories.matched == 0 tags: [ 'config-check' ] +- name: Create storage pool path directory if (libvirt session uri) + file: + path: "{{ libvirt_storage_pool_path }}" + state: directory + when: 'not libvirt_uri_system|bool' + tags: ['storage-pool-path'] + +- name: Create storage pool path directory and set group if using (libvirt system uri) + file: + path: "{{ libvirt_storage_pool_path }}" + state: directory + owner: root + group: "{{ libvirt_qemu_group }}" + mode: "0775" + when: 'libvirt_uri_system|bool' + tags: ['storage-pool-path'] + - name: Create kdevops guestfs storage directory if missing (libvirt session uri) file: path: "{{ guestfs_base_image_dir }}" ^ permalink raw reply related [flat|nested] 12+ messages in thread
* [PATCH 6/6] gen_nodes: ensure kdevops prefix has no dashes 2025-03-23 11:50 [PATCH 0/6] debian / libvirt / devconfig fixes Luis Chamberlain ` (4 preceding siblings ...) 2025-03-23 11:50 ` [PATCH 5/6] guestfs: add ansible group permisison check on libvirt system uri Luis Chamberlain @ 2025-03-23 11:50 ` Luis Chamberlain 5 siblings, 0 replies; 12+ messages in thread From: Luis Chamberlain @ 2025-03-23 11:50 UTC (permalink / raw) To: kdevops; +Cc: Luis Chamberlain Folks trying to use kdevops and testing with fstests will quickly find out a surprise that their config is not being parsed correctly until later. Fix this by preventing bringup if the prefix has a dash. We use the dash to help parallelize testing filesystem profiles and so the host prefix goes before the filesystem name and test profile. Signed-off-by: Luis Chamberlain <mcgrof@kernel.org> --- playbooks/roles/gen_nodes/tasks/main.yml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/playbooks/roles/gen_nodes/tasks/main.yml b/playbooks/roles/gen_nodes/tasks/main.yml index d541dcbf1f54..8c6a1f705ee2 100644 --- a/playbooks/roles/gen_nodes/tasks/main.yml +++ b/playbooks/roles/gen_nodes/tasks/main.yml @@ -18,6 +18,11 @@ command: "id -g -n" register: my_group +- name: Fail if kdevops_host_prefix contains a dash + fail: + msg: "Invalid kdevops_host_prefix '{{ kdevops_host_prefix }}'. The prefix cannot contain a dash ('-')." + when: kdevops_host_prefix is search("-") + - name: Create guestfs directory ansible.builtin.file: path: "{{ guestfs_path }}" -- 2.47.2 ^ permalink raw reply related [flat|nested] 12+ messages in thread
* [PATCH 0/6] debian / libvirt / devconfig fixes
@ 2025-03-29 23:01 Luis Chamberlain
2025-03-29 23:01 ` [PATCH 4/6] Kconfig: adopt output yaml for KDEVOPS_FIRST_RUN Luis Chamberlain
0 siblings, 1 reply; 12+ messages in thread
From: Luis Chamberlain @ 2025-03-29 23:01 UTC (permalink / raw)
To: kdevops; +Cc: Luis Chamberlain
Changes on this v2:
I only modified this series with 1 small change and the commit log
on patch #5 "guestfs: replace ansible group permisison requirement on
libvirt system uri" with the changes on here:
https://lore.kernel.org/all/Z-h3eTCpRC28eaCm@bombadil.infradead.org/T/#mcdb789863b84ed219ed19eeccac3eb8dcfcca17b
That's it.
Lemme know if this looks good, I just tested this on a bringup on a shared
system.
Luis Chamberlain (6):
scripts/bringup_guestfs.sh: uninstall unattended-upgrades on debian
guests
devconfig: ensure unattended-upgrades is not installed on debian
libvirt: use consistent pool path variables and use optional yaml
output
Kconfig: adopt output yaml for KDEVOPS_FIRST_RUN
guestfs: replace ansible group permisison requirement on libvirt
system uri
gen_nodes: ensure kdevops prefix has no dashes
Kconfig | 1 +
kconfigs/Kconfig.guestfs | 15 ++++
kconfigs/Kconfig.libvirt | 11 ++-
.../roles/bringup_guestfs/tasks/main.yml | 76 +++++++++++++++++++
.../tasks/install-deps/debian/main.yml | 22 ++++++
playbooks/roles/gen_nodes/tasks/main.yml | 5 ++
scripts/bringup_guestfs.sh | 6 +-
scripts/bringup_vagrant.sh | 2 +-
scripts/destroy_guestfs.sh | 2 +-
scripts/destroy_vagrant.sh | 2 +-
scripts/gen-nodes.Makefile | 6 --
scripts/guestfs.Makefile | 9 +--
scripts/prune_stale_vagrant.sh | 2 +-
scripts/vagrant.Makefile | 5 --
14 files changed, 137 insertions(+), 27 deletions(-)
--
2.47.2
^ permalink raw reply [flat|nested] 12+ messages in thread* [PATCH 4/6] Kconfig: adopt output yaml for KDEVOPS_FIRST_RUN 2025-03-29 23:01 [PATCH 0/6] debian / libvirt / devconfig fixes Luis Chamberlain @ 2025-03-29 23:01 ` Luis Chamberlain 0 siblings, 0 replies; 12+ messages in thread From: Luis Chamberlain @ 2025-03-29 23:01 UTC (permalink / raw) To: kdevops; +Cc: Luis Chamberlain This will be used later. Signed-off-by: Luis Chamberlain <mcgrof@kernel.org> --- Kconfig | 1 + 1 file changed, 1 insertion(+) diff --git a/Kconfig b/Kconfig index 357341be108d..988782a9dc83 100644 --- a/Kconfig +++ b/Kconfig @@ -30,6 +30,7 @@ config NEEDS_LOCAL_DEVELOPMENT_PATH config KDEVOPS_FIRST_RUN bool "Is this your first time running kdevops on this system?" + output yaml default n help When you run kdevops for the first time we can enable options -- 2.47.2 ^ permalink raw reply related [flat|nested] 12+ messages in thread
end of thread, other threads:[~2025-03-29 23:01 UTC | newest] Thread overview: 12+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2025-03-23 11:50 [PATCH 0/6] debian / libvirt / devconfig fixes Luis Chamberlain 2025-03-23 11:50 ` [PATCH 1/6] scripts/bringup_guestfs.sh: uninstall unattended-upgrades on debian guests Luis Chamberlain 2025-03-23 11:50 ` [PATCH 2/6] devconfig: ensure unattended-upgrades is not installed on debian Luis Chamberlain 2025-03-23 11:50 ` [PATCH 3/6] libvirt: use consistent pool path variables and use optional yaml output Luis Chamberlain 2025-03-23 11:50 ` [PATCH 4/6] Kconfig: adopt output yaml for KDEVOPS_FIRST_RUN Luis Chamberlain 2025-03-23 11:50 ` [PATCH 5/6] guestfs: add ansible group permisison check on libvirt system uri Luis Chamberlain 2025-03-25 14:53 ` Daniel Gomez 2025-03-29 21:55 ` Luis Chamberlain 2025-03-29 22:43 ` Luis Chamberlain 2025-03-29 22:55 ` Luis Chamberlain 2025-03-23 11:50 ` [PATCH 6/6] gen_nodes: ensure kdevops prefix has no dashes Luis Chamberlain -- strict thread matches above, loose matches on Subject: below -- 2025-03-29 23:01 [PATCH 0/6] debian / libvirt / devconfig fixes Luis Chamberlain 2025-03-29 23:01 ` [PATCH 4/6] Kconfig: adopt output yaml for KDEVOPS_FIRST_RUN Luis Chamberlain
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox