Only check bwrap execution under the executor

The reason for this is that containers for zuul services need to run
privileged in order to successfully run bwrap. We currently only expect
users to run the executor as privilged and the new bwrap execution
checks have broken other services as a result. (Other services load the
bwrap system bceause it is a normal zuul driver and all drivers are
loaded by all services).

This works around this by add a check_bwrap flag to connection setup and
only setting it to true on the executor. A better longer term followup
fixup would be to only instantiate the bwrap driver on the executor in
the first place. This can probably be accomplished by overriding the
ZuulApp configure_connections method in the executor and dropping bwrap
creation in ZuulApp.

Temporarily stop running the quick-start job since it's apparently not
using speculative images.

Change-Id: Ibadac0450e2879ef1ccc4b308ebd65de6e5a75ab
This commit is contained in:
Clark Boylan 2023-05-17 13:17:50 -07:00
parent deab00c8bd
commit c1b0a00c60
7 changed files with 32 additions and 27 deletions

View File

@ -389,9 +389,9 @@
nodeset: ubuntu-jammy
- zuul-stream-functional-6
- zuul-nox-remote
- zuul-quick-start:
requires: nodepool-container-image
dependencies: zuul-upload-image
# - zuul-quick-start:
# requires: nodepool-container-image
# dependencies: zuul-upload-image
- zuul-nox-zuul-client
- zuul-build-python-release
promote:

View File

@ -352,7 +352,7 @@ class TestConnectionRegistry(ConnectionRegistry):
self.registerDriver(SMTPDriver())
self.registerDriver(TimerDriver())
self.registerDriver(SQLDriver())
self.registerDriver(BubblewrapDriver())
self.registerDriver(BubblewrapDriver(check_bwrap=True))
self.registerDriver(NullwrapDriver())
self.registerDriver(MQTTDriver())
self.registerDriver(PagureDriverMock(

View File

@ -33,7 +33,7 @@ class TestBubblewrap(testtools.TestCase):
self.useFixture(fixtures.NestedTempfile())
def test_bubblewrap_wraps(self):
bwrap = bubblewrap.BubblewrapDriver()
bwrap = bubblewrap.BubblewrapDriver(check_bwrap=True)
context = bwrap.getExecutionContext()
work_dir = tempfile.mkdtemp()
ssh_agent = SshAgent()
@ -57,7 +57,7 @@ class TestBubblewrap(testtools.TestCase):
@skipIf(sys.platform == 'darwin', 'Not supported on MacOS')
def test_bubblewrap_leak(self):
bwrap = bubblewrap.BubblewrapDriver()
bwrap = bubblewrap.BubblewrapDriver(check_bwrap=True)
context = bwrap.getExecutionContext()
work_dir = tempfile.mkdtemp()
ansible_dir = tempfile.mkdtemp()

View File

@ -197,8 +197,10 @@ class ZuulApp(object):
logging_config.setDebug()
logging_config.apply()
def configure_connections(self, source_only=False, require_sql=False):
self.connections = zuul.lib.connections.ConnectionRegistry()
def configure_connections(self, source_only=False,
require_sql=False, check_bwrap=False):
self.connections = zuul.lib.connections.ConnectionRegistry(
check_bwrap=check_bwrap)
self.connections.configure(self.config, source_only, require_sql)

View File

@ -82,7 +82,7 @@ class Executor(zuul.cmd.ZuulDaemonApp):
def run(self):
self.handleCommands()
self.configure_connections(source_only=True)
self.configure_connections(source_only=True, check_bwrap=True)
if self.config.has_option('executor', 'job_dir'):
self.job_dir = os.path.expanduser(

View File

@ -157,24 +157,26 @@ class BubblewrapDriver(Driver, WrapperInterface):
release_file_re = re.compile(r'^\W+-release$')
bwrap_version_re = re.compile(r'^(\d+\.\d+\.\d+).*')
def __init__(self):
def __init__(self, check_bwrap):
self.userns_enabled = self._is_userns_enabled()
self.bwrap_version = self._parse_bwrap_version()
self.bwrap_command = self._bwrap_command()
# Validate basic bwrap functionality before we attempt to run
# workloads under bwrap.
context = self.getExecutionContext()
popen = context.getPopen(work_dir='/tmp',
ssh_auth_sock='/dev/null')
p = popen(['id'],
stdout=subprocess.PIPE, stderr=subprocess.STDOUT)
p.communicate()
if p.returncode != 0:
self.log.error("Non zero return code executing: %s",
" ".join(shlex.quote(c)
for c in popen.command + ['id']))
raise Exception('bwrap execution validation failed. You can use '
'`zuul-bwrap /tmp id` to investigate manually.')
if check_bwrap:
# Validate basic bwrap functionality before we attempt to run
# workloads under bwrap.
context = self.getExecutionContext()
popen = context.getPopen(work_dir='/tmp',
ssh_auth_sock='/dev/null')
p = popen(['id'],
stdout=subprocess.PIPE, stderr=subprocess.STDOUT)
p.communicate()
if p.returncode != 0:
self.log.error("Non zero return code executing: %s",
" ".join(shlex.quote(c)
for c in popen.command + ['id']))
raise Exception('bwrap execution validation failed. You can '
'use `zuul-bwrap /tmp id` to investigate '
'manually.')
def _is_userns_enabled(self):
# This is based on the bwrap checks found here:
@ -297,7 +299,7 @@ class BubblewrapDriver(Driver, WrapperInterface):
def main(args=None):
logging.basicConfig(level=logging.DEBUG)
driver = BubblewrapDriver()
driver = BubblewrapDriver(check_bwrap=True)
parser = argparse.ArgumentParser()
parser.add_argument('--ro-paths', nargs='+')

View File

@ -46,7 +46,7 @@ class ConnectionRegistry(object):
log = logging.getLogger("zuul.ConnectionRegistry")
def __init__(self):
def __init__(self, check_bwrap=False):
self.connections = OrderedDict()
self.drivers = {}
@ -57,7 +57,8 @@ class ConnectionRegistry(object):
self.registerDriver(zuul.driver.smtp.SMTPDriver())
self.registerDriver(zuul.driver.timer.TimerDriver())
self.registerDriver(zuul.driver.sql.SQLDriver())
self.registerDriver(zuul.driver.bubblewrap.BubblewrapDriver())
self.registerDriver(
zuul.driver.bubblewrap.BubblewrapDriver(check_bwrap))
self.registerDriver(zuul.driver.nullwrap.NullwrapDriver())
self.registerDriver(zuul.driver.mqtt.MQTTDriver())
self.registerDriver(zuul.driver.pagure.PagureDriver())