-
Notifications
You must be signed in to change notification settings - Fork 462
MCO-396: daemon: FCOS workaround, plus SELinux workaround #3358
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
MCO-396: daemon: FCOS workaround, plus SELinux workaround #3358
Conversation
This works around an rpm-ostree regression https://issues.redhat.com/browse/OKD-63
|
/test okd-e2e-aws |
|
OKD install now passes in okd-e2e-aws, thanks! |
yuqi-zhang
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
|
CI is currently blocked on https://issues.redhat.com/browse/TRT-589 |
|
/retest |
|
OK from the controlplane journal on OKD: Argh. This is likely to bite us in RHEL too. We're going to need to override the container security context. This issue is one of the reasons why running ostree in a container is a bit tricky. |
|
OK I rolled a workaround for https://issues.redhat.com/browse/MCO-396 into this, because the OKD path is hitting this today. |
|
/test ci/prow/okd-e2e-aws |
|
@cgwalters: The specified target(s) for
The following commands are available to trigger optional jobs:
Use
DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
/test okd-e2e-aws |
In practice, we should ship a SELinux policy tweak that allows a transition from `spc_t` -> `install_t` but for now I want to see if this works.
36d9ff0 to
0451275
Compare
|
/test okd-e2e-aws |
🎉 |
|
/jira refresh |
|
/lgtm |
|
This undermines my confidence in the old-bootimage path, we'll want to verify that better after this lands. |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: cgwalters, sinnykumari, yuqi-zhang The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
/test okd-scos-images |
|
/retest |
|
/skip SKipping optional tests as it unblocks OKD nightlies |
|
/retest |
1 similar comment
|
/retest |
|
/hold Revision 0451275 was retested 3 times: holding |
|
/test e2e-agnostic-upgrade |
|
/hold cancel |
|
/retest |
|
@cgwalters: The following tests failed, say
Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
|
/retest |
daemon: Temporarily copy auth file with more open perms on FCOS
This works around an rpm-ostree regression
https://issues.redhat.com/browse/OKD-63
daemon: Temporarily
setenforce 0for inplace update from containerIn practice, we should ship a SELinux policy tweak that allows a transition
from
spc_t->install_tbut for now I want to see if this works.