Closed anjalirai-intel closed 1 month ago
How is it possible that this wasn't noticed during review? No one tested the PR? What about CI, I thought that internal Intel CI was testing this?
How is it possible that this wasn't noticed during review? No one tested the PR? What about CI, I thought that internal Intel CI was testing this?
This PR was tested on the same opensuse machine used for development. During development, I modified the file permissions to enable reading, and these permissions remained the same during testing. Therefore, this issue was not identified in CI. The read operation is necessary to copy the credential file into the Docker image for installing packages, yet granting read permissions could expose sensitive data to all users. Is there a solution we can devise to address this issue?
SUSE Support simply recommends granting the current user the read access to this file:
This PR was tested on the same opensuse machine used for development
vs
Therefore, this issue was not identified in CI.
I don't understand, does this mean that you're developing on CI machines and they aren't separate? So, every change you make persistently changes the CI environment?
This PR was tested on the same opensuse machine used for development
vs
Therefore, this issue was not identified in CI.
I don't understand, does this mean that you're developing on CI machines and they aren't separate? So, every change you make persistently changes the CI environment?
@mkow We typically don't do testing and developing on the same infra. However, due to a host dependency for SUSE and a lack of available machines to reflash to SUSE, we conducted testing on the same infra.
SUSE Support simply recommends granting the current user the read access to this file:
@mkow According to this, issue should be resolved once the customer grants read access to the credentials file. Where should we include this comment?
@adarshan-intel @anjalirai-intel Do we even think this is an important note to have? I would imagine that commercial SUSE users know about this requirement, or can quickly contact SUSE support. The error from GSC is pretty clear, and I feel like there's no need for additional pretty-printing.
@adarshan-intel @anjalirai-intel Do we even think this is an important note to have? I would imagine that commercial SUSE users know about this requirement, or can quickly contact SUSE support. The error from GSC is pretty clear, and I feel like there's no need for additional pretty-printing.
I agree, therefore I think no additional fixes are required and we can proceed to close this issue.
@dimakuv We don't have any such ask from validation perspective. If this is a common thing for SUSE we are okay taking no action for issue
SUSE Support simply recommends granting the current user the read access to this file:
@dimakuv @mkow I believe this answers the issue, so can we go ahead and close this? Or it requires any further action?
Fine from my side to just close this issue.
Description of the problem
GSC templates for SUSE reads
/etc/zypp/credentials.d/SCCcredentials
file, the credentials file does not have read permssions for the current user, hence gsc build fails when it is trying to read this file$ ls -al /etc/zypp/credentials.d/SCCcredentials -rw------- 1 root root 122 Sep 9 13:14 /etc/zypp/credentials.d/SCCcredentials
Steps to reproduce
./gsc build -nc --insecure-args bash-test test/ubuntu20.04-bash.manifest
Expected results
GSC Build should be successful, it should not throw any error
Actual results
Resolution
Change the file permissions to read/write for current user