Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

lxc remote add fails with EOF when posting to /1.0/certificates #1058

Closed
rrva opened this issue Aug 29, 2015 · 3 comments
Closed

lxc remote add fails with EOF when posting to /1.0/certificates #1058

rrva opened this issue Aug 29, 2015 · 3 comments
Assignees
Labels
Bug Confirmed to be a bug Easy Good for new contributors
Milestone

Comments

@rrva
Copy link
Contributor

rrva commented Aug 29, 2015

In 0.16, when I enable listening over HTTPS with

lxc config set core.https_address [::]:8443
lxc config set core.trust_password blah

On the same machine as lxd runs:

lxc remote add localhost localhost

I get

lxc remote add localhost localhost
Admin password for localhost:
error: Post https://localhost:8443/1.0/certificates: EOF

lxd logfile

INFO[08-29|11:53:26] LXD is starting                          path=/var/lib/lxd
INFO[08-29|11:53:26] Default uid/gid map:
INFO[08-29|11:53:26]  - u 0 100000 65536
INFO[08-29|11:53:26]  - g 0 100000 65536
INFO[08-29|11:53:26] Init                                     driver=storage/btrfs
INFO[08-29|11:53:26] Looking for existing certificates:       cert=/var/lib/lxd/server.crt key=/var/lib/lxd/server.key
INFO[08-29|11:53:26] LXD isn't socket activated
INFO[08-29|11:53:26] REST API daemon:
INFO[08-29|11:53:26]  - binding socket                        socket=/var/lib/lxd/unix.socket
INFO[08-29|11:53:26]  - binding socket                        socket=[::]:8443
INFO[08-29|11:53:41] allowing untrusted GET                   url=/1.0 ip=127.0.0.1:39063
DBUG[08-29|11:53:41]
        {
                "type": "sync",
                "status": "Success",
                "status_code": 200,
                "metadata": {
                        "api_compat": 1,
                        "auth": "untrusted"
                }
        }
INFO[08-29|11:53:41] allowing untrusted GET                   ip=127.0.0.1:39063 url=/1.0
DBUG[08-29|11:53:41]
        {
                "type": "sync",
                "status": "Success",
                "status_code": 200,
                "metadata": {
                        "api_compat": 1,
                        "auth": "untrusted"
                }
        }
INFO[08-29|11:53:44] allowing untrusted POST                  url=/1.0/certificates ip=127.0.0.1:39063
DBUG[08-29|11:53:44]
        {
                "password": "blah",
                "type": "client"
        }
2015/08/29 11:53:44 http: panic serving 127.0.0.1:39063: runtime error: slice bounds out of range
goroutine 50 [running]:
net/http.(*conn).serve.func1(0xc820258000, 0x7f54c7f94088, 0xc820256000)
        /usr/local/go/src/net/http/server.go:1287 +0xb5
main.(*Daemon).PasswordCheck(0xc82009fb80, 0xc8201be510, 0x4, 0x9)
        /home/vagrant/go/src/github.com/lxc/lxd/lxd/daemon.go:955 +0x953
main.certificatesPost(0xc82009fb80, 0xc82000c2a0, 0x0, 0x0)
        /home/vagrant/go/src/github.com/lxc/lxd/lxd/daemon.go:955 +0x953                                                                               
main.certificatesPost(0xc82009fb80, 0xc82000c2a0, 0x0, 0x0)
        /home/vagrant/go/src/github.com/lxc/lxd/lxd/certificates.go:144 +0x4f2
main.(*Daemon).createCmd.func1(0x7f54c7f9c930, 0xc820258160, 0xc82000c2a0)
        /home/vagrant/go/src/github.com/lxc/lxd/lxd/daemon.go:266 +0x80d
net/http.HandlerFunc.ServeHTTP(0xc820199f90, 0x7f54c7f9c930, 0xc820258160, 0xc82000c2a0)
        /usr/local/go/src/net/http/server.go:1422 +0x3a
github.com/gorilla/mux.(*Router).ServeHTTP(0xc820198690, 0x7f54c7f9c930, 0xc820258160, 0xc82000c2a0)
        /home/vagrant/go/src/github.com/gorilla/mux/mux.go:100 +0x29e
net/http.serverHandler.ServeHTTP(0xc82022c480, 0x7f54c7f9c930, 0xc820258160, 0xc82000c2a0)
        /usr/local/go/src/net/http/server.go:1862 +0x19e
net/http.(*conn).serve(0xc820258000)
        /usr/local/go/src/net/http/server.go:1361 +0xbee
created by net/http.(*Server).Serve
        /usr/local/go/src/net/http/server.go:1910 +0x3f6
@rrva
Copy link
Contributor Author

rrva commented Aug 29, 2015

Nevermind, password was not set. The PasswordCheck function could log this.

@rrva rrva closed this as completed Aug 29, 2015
@tych0
Copy link
Contributor

tych0 commented Aug 29, 2015

Sorry, can we reopen this and fix it with a better error message?
On Aug 29, 2015 5:05 AM, "Ragnar Rova" notifications@github.com wrote:

Closed #1058 https://github.com/lxc/lxd/issues/1058.


Reply to this email directly or view it on GitHub
https://github.com/lxc/lxd/issues/1058#event-395712099.

@stgraber stgraber reopened this Aug 29, 2015
@stgraber
Copy link
Contributor

yup, getting a stacktrace is never a good thing :)

@stgraber stgraber mentioned this issue Sep 5, 2015
@stgraber stgraber added Bug Confirmed to be a bug Easy Good for new contributors labels Sep 5, 2015
@stgraber stgraber added this to the lxd-0.18 milestone Sep 5, 2015
@stgraber stgraber self-assigned this Sep 5, 2015
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Bug Confirmed to be a bug Easy Good for new contributors
Projects
None yet
Development

No branches or pull requests

3 participants