Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

unixPB: Install rng-tools to fix low entropy #3145

Merged
merged 1 commit into from
Sep 28, 2023
Merged

Conversation

aswinkr77
Copy link
Contributor

Cryptography tests are failing as not enough random information is being generated on older distributions, causing tests to timeout.
So installing and enabling rng-tools and its services fix the issues.

Fixes:
Checklist
  • commit message has one of the standard prefixes
  • faq.md updated if appropriate
  • other documentation is changed or added (if applicable)
  • playbook changes run through VPC or QPC (if you have access)
  • VPC/QPC not applicable for this PR
  • for inventory.yml changes, bastillion/nagios/jenkins updated accordingly

Copy link

@github-actions github-actions bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

A block has been put on this Pull Request as this repository is temporarily under a code freeze due to an ongoing release cycle.

If this pull request needs to be merged during the release cycle then please comment /merge and a PMC member will be able to remove the block.

If the code freeze is over you can remove this block by commenting /thaw.

@gdams
Copy link
Member

gdams commented Aug 21, 2023

/thaw

@github-actions github-actions bot dismissed their stale review August 21, 2023 15:49

Pull Request unblocked - code freeze is over.

@AdamBrousseau
Copy link
Contributor

Do we need another review on this or just a merge?
cc @Haroon-Khel

@sxa
Copy link
Member

sxa commented Aug 23, 2023

Needs a second review first :-)

A couple of questions from me:

  • Will these rules work ok in a docker container? or is it only applicable on the host of such a container?
  • This won't be run on other distributions such as Debian/RHEL as-is - is that intentional?

@aswinkr77
Copy link
Contributor Author

Needs a second review first :-)

A couple of questions from me:

  • Will these rules work ok in a docker container? or is it only applicable on the host of such a container?
  • This won't be run on other distributions such as Debian/RHEL as-is - is that intentional?
  • We've never tested this on a container cause we don't run these tests on containers.
  • The PB will run on Ubuntu, Rhel, Cent and SLES, not Debian. We've never come across the entropy issue on a Debian machine, mostly it happened with the other four distros.

@sxa
Copy link
Member

sxa commented Aug 25, 2023

I'm on vacation until Tuesday but w will need to verify that these changes don't cause as problem in containers. Our build are performed in containers built with the playbooks so it's critical that this won't fail to execute or break anything there.
I would hope that it works be ok, but I'm nervous enough to want to be be verified first 😉
Surprised it hasn't been deemed necessary on Debian though - I wonder if they're doing anything different 🤷

@AdamBrousseau
Copy link
Contributor

@sxa does one of those automatic checks test the docker compile? If not will Adopt have the capacity to test what you want to verify? I don't think we have any Debian machines so it is untested on our end and unknown if needed.

@sxa
Copy link
Member

sxa commented Aug 29, 2023

I don't think we have any Debian machines so it is untested on our end and unknown if needed.

Understood. Thanks for clarifying

@sxa does one of those automatic checks test the docker compile?

No but we have automated triggers that try to run a docker build from the updated playbooks when things are merged. Normally it's not something that would cause a problem but when we're starting services and doing stuff related to things in /dev it makes me nervous that a docker environment is a bit special in those respects. If you're able to run a docker build with at least one of the dockerfiles in https://github.com/adoptium/infrastructure/tree/master/ansible/docker using these changes (Probably a CentOS one as a preference) that would be good.

@aswinkr77
Copy link
Contributor Author

aswinkr77 commented Sep 27, 2023

@sxa, I ran the PB on the centos6 image. Build openjdk11. Everything went fine.

Copy link
Member

@sxa sxa left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@sxa ran the PB on the centos6 image. Build openjdk11. Everything went fine.

OK That basis I'm ok with giving this a shot :-) My only comment would be that it might be worth putting the package installs into the common role where we already have a good abstraction for the distributions.

I'm in two minds about whether to request that we have the adoptopenjdk tag on this one since it could make a notable change to end users systems. If anyone else has a view on these feel free to jump in :-)

@andrew-m-leonard FYI - I don't /think/ this should affect build reproducibility but let me know if you want to perform any additional checks prior to merging.

@andrew-m-leonard
Copy link
Contributor

Sounds reasonable to me

@sxa
Copy link
Member

sxa commented Sep 27, 2023

I'll plan to merge this tomorrow after the overnight build cycles in the absence of any objections.

@sxa sxa merged commit a2989df into adoptium:master Sep 28, 2023
7 of 9 checks passed
sxa added a commit to sxa/infrastructure that referenced this pull request Sep 29, 2023
sxa added a commit that referenced this pull request Sep 29, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants