Activity log for bug #2011535

Date Who What changed Old value New value Message
2023-03-14 08:40:21 Takashi Kajinami bug added bug
2023-03-14 08:40:51 Takashi Kajinami summary nova can't access instance data because now the file is chowned to kvm group nova can't access instance image file because the file is now chowned to the kvm group by default
2023-03-15 16:47:09 Corey Bryant nova (Ubuntu): status New Triaged
2023-03-15 16:47:11 Corey Bryant nova (Ubuntu): importance Undecided Critical
2023-03-15 16:47:17 Corey Bryant nominated for series Ubuntu Lunar
2023-03-15 16:47:17 Corey Bryant bug task added nova (Ubuntu Lunar)
2023-03-15 16:47:17 Corey Bryant nominated for series Ubuntu Kinetic
2023-03-15 16:47:17 Corey Bryant bug task added nova (Ubuntu Kinetic)
2023-03-15 16:47:23 Corey Bryant nova (Ubuntu Kinetic): status New Triaged
2023-03-15 16:47:25 Corey Bryant nova (Ubuntu Kinetic): importance Undecided Critical
2023-03-15 16:59:50 Corey Bryant description It seems libvirt package in Ubuntu 22.04 uses the kvm group instead of the libvirt-qemu group when launching a qemu process. Because of this change and the default behavior of libvirt which makes all image files chowned by the group/user to run qemu process, the instance files are owned by the kvm group, instead of the libvirt-qemu group. However currently the nova user is still added to the libvirt-qemu group instead of the kvm group. Because of this inconsistency nova can't access to instance image once the files are chowned to the kvm group. nova 3:26.1.0-0ubuntu1~cloud0 libvirt 8.0.0-1ubuntu7.4 I've found the problem in puppet jobs. (example https://zuul.opendev.org/t/openstack/build/d6f2fb2e92ad4ece86bcd3d8793bf920 ) Example error in nova can be found here: https://2e4f6457af6d4bb29c73-cc818d493c2a52ef4d37701157d67702.ssl.cf2.rackcdn.com/877214/2/check/puppet-openstack-integration-7-scenario002-tempest-ubuntu-jammy/d6f2fb2/logs/nova/nova-compute.txt I've tested adding the nova user to the kvm group and confirmed this fixes the error. https://review.opendev.org/c/openstack/puppet-openstack-integration/+/877338 [Impact] This affects the nova package for kinetic and lunar. It is a side-effect of the changes made in https://bugs.launchpad.net/charm-nova-compute/+bug/1967956, specifically (1) and (3) described in https://bugs.launchpad.net/charm-nova-compute/+bug/1967956/comments/10. We tightened the mode of directories under /var/lib/nova from 755 to 750, and the mode of files under /var/lib/nova from 644 to 640. As a result, adding nova to the kvm group was required for nova to be able to access vm disks. == original bug description == It seems libvirt package in Ubuntu 22.04 uses the kvm group instead of the libvirt-qemu group when launching a qemu process. Because of this change and the default behavior of libvirt which makes all image files chowned by the group/user to run qemu process, the instance files are owned by the kvm group, instead of the libvirt-qemu group. However currently the nova user is still added to the libvirt-qemu group instead of the kvm group. Because of this inconsistency nova can't access to instance image once the files are chowned to the kvm group. nova 3:26.1.0-0ubuntu1~cloud0 libvirt 8.0.0-1ubuntu7.4 I've found the problem in puppet jobs. (example https://zuul.opendev.org/t/openstack/build/d6f2fb2e92ad4ece86bcd3d8793bf920 ) Example error in nova can be found here: https://2e4f6457af6d4bb29c73-cc818d493c2a52ef4d37701157d67702.ssl.cf2.rackcdn.com/877214/2/check/puppet-openstack-integration-7-scenario002-tempest-ubuntu-jammy/d6f2fb2/logs/nova/nova-compute.txt I've tested adding the nova user to the kvm group and confirmed this fixes the error. https://review.opendev.org/c/openstack/puppet-openstack-integration/+/877338 [Test Case] At the most basic level we can install the nova-compute-qemu package on a machine, and install the nova-compute-kvm package on another machine, and compare the directory and file modes under the /var/lib/nova/ tree. I'm sure Takashi will be able to give feedback on the fix as well. [Regression Potential] This is fixing a regression. We already add the nova user to the kvm group as part of the nova-compute-kvm postinst script, and this fix is doing the same for the nova-compute-qemu postinst script. I don't foresee any new regressions as a result of this.
2023-03-15 17:05:42 Corey Bryant description [Impact] This affects the nova package for kinetic and lunar. It is a side-effect of the changes made in https://bugs.launchpad.net/charm-nova-compute/+bug/1967956, specifically (1) and (3) described in https://bugs.launchpad.net/charm-nova-compute/+bug/1967956/comments/10. We tightened the mode of directories under /var/lib/nova from 755 to 750, and the mode of files under /var/lib/nova from 644 to 640. As a result, adding nova to the kvm group was required for nova to be able to access vm disks. == original bug description == It seems libvirt package in Ubuntu 22.04 uses the kvm group instead of the libvirt-qemu group when launching a qemu process. Because of this change and the default behavior of libvirt which makes all image files chowned by the group/user to run qemu process, the instance files are owned by the kvm group, instead of the libvirt-qemu group. However currently the nova user is still added to the libvirt-qemu group instead of the kvm group. Because of this inconsistency nova can't access to instance image once the files are chowned to the kvm group. nova 3:26.1.0-0ubuntu1~cloud0 libvirt 8.0.0-1ubuntu7.4 I've found the problem in puppet jobs. (example https://zuul.opendev.org/t/openstack/build/d6f2fb2e92ad4ece86bcd3d8793bf920 ) Example error in nova can be found here: https://2e4f6457af6d4bb29c73-cc818d493c2a52ef4d37701157d67702.ssl.cf2.rackcdn.com/877214/2/check/puppet-openstack-integration-7-scenario002-tempest-ubuntu-jammy/d6f2fb2/logs/nova/nova-compute.txt I've tested adding the nova user to the kvm group and confirmed this fixes the error. https://review.opendev.org/c/openstack/puppet-openstack-integration/+/877338 [Test Case] At the most basic level we can install the nova-compute-qemu package on a machine, and install the nova-compute-kvm package on another machine, and compare the directory and file modes under the /var/lib/nova/ tree. I'm sure Takashi will be able to give feedback on the fix as well. [Regression Potential] This is fixing a regression. We already add the nova user to the kvm group as part of the nova-compute-kvm postinst script, and this fix is doing the same for the nova-compute-qemu postinst script. I don't foresee any new regressions as a result of this. [Impact] This affects the nova package for kinetic and lunar. It is a side-effect of the changes made in https://bugs.launchpad.net/charm-nova-compute/+bug/1967956, specifically (1) and (3) described in https://bugs.launchpad.net/charm-nova-compute/+bug/1967956/comments/10. We tightened the mode of directories under /var/lib/nova from 755 to 750, and the mode of files under /var/lib/nova from 644 to 640. As a result, adding nova to the kvm group was required for nova to be able to access vm disks. We did that for nova-compute-kvm package but failed to do so for the nova-compute-qemu package. == original bug description == It seems libvirt package in Ubuntu 22.04 uses the kvm group instead of the libvirt-qemu group when launching a qemu process. Because of this change and the default behavior of libvirt which makes all image files chowned by the group/user to run qemu process, the instance files are owned by the kvm group, instead of the libvirt-qemu group. However currently the nova user is still added to the libvirt-qemu group instead of the kvm group. Because of this inconsistency nova can't access to instance image once the files are chowned to the kvm group. nova 3:26.1.0-0ubuntu1~cloud0 libvirt 8.0.0-1ubuntu7.4 I've found the problem in puppet jobs. (example https://zuul.opendev.org/t/openstack/build/d6f2fb2e92ad4ece86bcd3d8793bf920 ) Example error in nova can be found here: https://2e4f6457af6d4bb29c73-cc818d493c2a52ef4d37701157d67702.ssl.cf2.rackcdn.com/877214/2/check/puppet-openstack-integration-7-scenario002-tempest-ubuntu-jammy/d6f2fb2/logs/nova/nova-compute.txt I've tested adding the nova user to the kvm group and confirmed this fixes the error. https://review.opendev.org/c/openstack/puppet-openstack-integration/+/877338 [Test Case] At the most basic level we can install the nova-compute-qemu package on a machine, and install the nova-compute-kvm package on another machine, and compare the directory and file modes under the /var/lib/nova/ tree. I'm sure Takashi will be able to give feedback on the fix as well. [Regression Potential] This is fixing a regression. We already add the nova user to the kvm group as part of the nova-compute-kvm postinst script, and this fix is doing the same for the nova-compute-qemu postinst script. I don't foresee any new regressions as a result of this.
2023-03-15 23:07:42 Launchpad Janitor nova (Ubuntu Lunar): status Triaged Fix Released
2023-03-17 20:07:24 Steve Langasek nova (Ubuntu Kinetic): status Triaged Fix Committed
2023-03-17 20:07:26 Steve Langasek bug added subscriber Ubuntu Stable Release Updates Team
2023-03-17 20:07:27 Steve Langasek bug added subscriber SRU Verification
2023-03-17 20:07:30 Steve Langasek tags verification-needed verification-needed-kinetic
2023-04-10 14:54:18 Corey Bryant bug task added cloud-archive
2023-04-10 14:54:27 Corey Bryant nominated for series cloud-archive/zed
2023-04-10 14:54:27 Corey Bryant bug task added cloud-archive/zed
2023-04-10 14:54:33 Corey Bryant cloud-archive: status New Fix Released
2023-04-10 14:54:38 Corey Bryant cloud-archive/zed: status New Fix Committed
2023-04-10 14:54:41 Corey Bryant cloud-archive/zed: importance Undecided Critical
2023-04-10 14:55:35 Corey Bryant tags verification-needed verification-needed-kinetic verification-done verification-done-kinetic verification-zed-done
2023-04-11 14:47:16 Corey Bryant cloud-archive/zed: status Fix Committed Fix Released
2023-04-11 21:24:19 Launchpad Janitor nova (Ubuntu Kinetic): status Fix Committed Fix Released