← Back to team overview

canonical-ubuntu-qa team mailing list archive

[Bug 2027561] [NEW] lxc-test-fuzzers requires firewall change for accessing storage.googleapis.com

 

Public bug reported:

Issue found on Lunar, in this lxc-test-fuzzers test it will require
firewall rule change to allow access to storage.googleapis.com

$ sudo ./lxc-test-fuzzers 
+ set -o pipefail
++ mktemp -d
+ TMP_DIR=/tmp/tmp.r4JMx0yb50
+ export ASAN_OPTIONS=detect_stack_use_after_return=1:check_initialization_order=1:strict_init_order=1:strict_string_checks=1
+ ASAN_OPTIONS=detect_stack_use_after_return=1:check_initialization_order=1:strict_init_order=1:strict_string_checks=1
+ export UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:halt_on_error=1
+ UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:halt_on_error=1
+ trap cleanup exit
+ for fuzzer in /usr/bin/fuzz-lxc-*
++ basename '/usr/bin/fuzz-lxc-*'
+ name='fuzz-lxc-*'
+ corpus_dir='/tmp/tmp.r4JMx0yb50/fuzz-lxc-*'
+ mkdir -p '/tmp/tmp.r4JMx0yb50/fuzz-lxc-*'
+ wget --directory-prefix=/tmp/tmp.r4JMx0yb50 'https://storage.googleapis.com/lxc-backup.clusterfuzz-external.appspot.com/corpus/libFuzzer/lxc_fuzz-lxc-*/public.zip'
Warning: wildcards not supported in HTTP.
--2023-07-12 09:28:48--  https://storage.googleapis.com/lxc-backup.clusterfuzz-external.appspot.com/corpus/libFuzzer/lxc_fuzz-lxc-*/public.zip
Resolving storage.googleapis.com (storage.googleapis.com)... 142.250.179.144, 142.250.179.208, 142.251.36.48, ...
Connecting to storage.googleapis.com (storage.googleapis.com)|142.250.179.144|:443... connected.
HTTP request sent, awaiting response... 403 Forbidden
2023-07-12 09:28:49 ERROR 403: Forbidden.

+ '/usr/bin/fuzz-lxc-*' -max_total_time=120 '/tmp/tmp.r4JMx0yb50/fuzz-lxc-*'
./lxc-test-fuzzers: line 24: /usr/bin/fuzz-lxc-*: No such file or directory
+ cleanup
+ rm -rf /tmp/tmp.r4JMx0yb50

** Affects: ubuntu-kernel-tests
     Importance: Undecided
         Status: New

-- 
You received this bug notification because you are a member of Canonical
Platform QA Team, which is subscribed to ubuntu-kernel-tests.
https://bugs.launchpad.net/bugs/2027561

Title:
  lxc-test-fuzzers requires firewall change for accessing
  storage.googleapis.com

Status in ubuntu-kernel-tests:
  New

Bug description:
  Issue found on Lunar, in this lxc-test-fuzzers test it will require
  firewall rule change to allow access to storage.googleapis.com

  $ sudo ./lxc-test-fuzzers 
  + set -o pipefail
  ++ mktemp -d
  + TMP_DIR=/tmp/tmp.r4JMx0yb50
  + export ASAN_OPTIONS=detect_stack_use_after_return=1:check_initialization_order=1:strict_init_order=1:strict_string_checks=1
  + ASAN_OPTIONS=detect_stack_use_after_return=1:check_initialization_order=1:strict_init_order=1:strict_string_checks=1
  + export UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:halt_on_error=1
  + UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:halt_on_error=1
  + trap cleanup exit
  + for fuzzer in /usr/bin/fuzz-lxc-*
  ++ basename '/usr/bin/fuzz-lxc-*'
  + name='fuzz-lxc-*'
  + corpus_dir='/tmp/tmp.r4JMx0yb50/fuzz-lxc-*'
  + mkdir -p '/tmp/tmp.r4JMx0yb50/fuzz-lxc-*'
  + wget --directory-prefix=/tmp/tmp.r4JMx0yb50 'https://storage.googleapis.com/lxc-backup.clusterfuzz-external.appspot.com/corpus/libFuzzer/lxc_fuzz-lxc-*/public.zip'
  Warning: wildcards not supported in HTTP.
  --2023-07-12 09:28:48--  https://storage.googleapis.com/lxc-backup.clusterfuzz-external.appspot.com/corpus/libFuzzer/lxc_fuzz-lxc-*/public.zip
  Resolving storage.googleapis.com (storage.googleapis.com)... 142.250.179.144, 142.250.179.208, 142.251.36.48, ...
  Connecting to storage.googleapis.com (storage.googleapis.com)|142.250.179.144|:443... connected.
  HTTP request sent, awaiting response... 403 Forbidden
  2023-07-12 09:28:49 ERROR 403: Forbidden.

  + '/usr/bin/fuzz-lxc-*' -max_total_time=120 '/tmp/tmp.r4JMx0yb50/fuzz-lxc-*'
  ./lxc-test-fuzzers: line 24: /usr/bin/fuzz-lxc-*: No such file or directory
  + cleanup
  + rm -rf /tmp/tmp.r4JMx0yb50

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/2027561/+subscriptions



Follow ups