-
-
Notifications
You must be signed in to change notification settings - Fork 15.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
cryptsetup: revert last update #46151
Conversation
This reverts commit 0b701f4. 2.0.4 fails its own tests.
(by default) so that updates like that won't happen again.
Success on x86_64-linux (full log) Attempted: cryptsetup Partial log (click to expand)
|
Success on aarch64-linux (full log) Attempted: cryptsetup Partial log (click to expand)
|
@@ -38,6 +38,8 @@ stdenv.mkDerivation rec { | |||
buildInputs = [ lvm2 json_c openssl libuuid popt ] | |||
++ stdenv.lib.optional enablePython python2; | |||
|
|||
doCheck = true; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
What was the failure message?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ideally we won't stuck on older versions forever or else we cannot get security updates.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It fails most "compat" tests with some strange "file not found" errors. It might be just a bug in the tests, but I would feel uneasy running cryptsetup
that could break something that is "compat".
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is this with or without sandbox? The latest cryptsetup also checks block devices for other filesystems and prevent corruption that way. That's means I would also feel uneasy to not having this safety feature.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I cannot reproduce the failure. Tests works for me: https://gist.github.com/Mic92/a603aea57ecd079b76903a54d3e1dd90#file-cryptsetup-log-L406
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
ok, File not found
could be the script itself, please try to use patchShebangs
instead:
https://gitlab.com/cryptsetup/cryptsetup/blob/master/tests/compat-test#L1
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There seem to be 2 issues here:
-
The
file not found
error above is sandbox-related (although patchShebangs is already used). Still trying to find the reason. -
With sandboxing disabled, the
compat
test runs and succeeds if the build directory is on an ext4 fs, but 2 test cases fail if the build directory is on a btrfs fs (which is my default here). This is weird. We cannot have test success depend on the what fs the build dir is on, so we will need to disable the failing cases.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
No, actually it's only one issue: the test uses an internal tool unit-utils-io
to read/write blocks in the file blocwise_localfile
. This file exists but unit-utils-io
opens it with O_DIRECT
https://gitlab.com/cryptsetup/cryptsetup/blob/master/tests/unit-utils-io.c#L92, which is forbidden on a tmpfs and on btrfs (which produces the file not found
errors - tmpfs in sandbox, btrfs without sandbox) but allowed on ext4. This is just stupid.
@oxij @Mic92 what should we do? We could
- revert to 2.0.3
- just disable this filesystem-dependent test
- create a nixos test to run complete the tests in a VM where we can control the file system type.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Either
- disable this filesystem-dependent test
- create a nixos test to run complete the tests in a VM where we can control the file system type.
O_DIRECT is not implemented on zfs. It is a braindead interface anyway.
Reverting just because a test does not work in our build environment is pointless as the test works perfectly fine without it.
Actually we already have integration tests for cryptsetup. And don't think we need to duplicate upstream testing beyond a certain level in our own systems. Most of the critical stuff in cryptsetup is implemented in the kernel anyway.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm implementing a solution to patch out O_DIRECT and disable the remaining 4 test cases. PR will follow shortly.
Some tests use O_DIRECT which is filesystem dependent and fails in a sandbox as well as on some filesystems without sandboxing. Patch out O_DIRECT and disable the 4 test cases that still fail in a sandbox. See discussion in NixOS#46151.
Some tests use O_DIRECT which is filesystem dependent and fails in a sandbox as well as on some filesystems without sandboxing. Patch out O_DIRECT and disable the 4 test cases that still fail in a sandbox. See discussion in #46151.
Motivation for this change
Fails tests.
Things done