Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

go1.18: [Tracker] go1.18 breaks CSR validation (fix pending in go1.18.1) #108910

Closed
MadhavJivrajani opened this issue Mar 23, 2022 · 32 comments
Closed
Assignees
Labels
kind/bug Categorizes issue or PR as related to a bug. kind/failing-test Categorizes issue or PR as related to a consistently or frequently failing test. priority/important-soon Must be staffed and worked on either currently, or very soon, ideally in time for the next release. release-blocker sig/auth Categorizes an issue or PR as relevant to SIG Auth. sig/testing Categorizes an issue or PR as relevant to SIG Testing. triage/accepted Indicates an issue or PR is ready to be actively worked on.
Milestone

Comments

@MadhavJivrajani
Copy link
Contributor

Which jobs are failing?

https://testgrid.k8s.io/sig-release-master-blocking#integration-master

Which tests are failing?

https://prow.k8s.io/view/gs/kubernetes-jenkins/pr-logs/pull/108905/pull-kubernetes-integration/1506459579091783680
an instance of a failure, the tests here are the ones failing

Since when has it been failing?

My guess is since #108870 was merged

Testgrid link

https://testgrid.k8s.io/sig-release-master-blocking#integration-master

Reason for failure (if possible)

https://tip.golang.org/doc/go1.18#sha1

Anything else we need to know?

No response

Relevant SIG(s)

/sig testing

@MadhavJivrajani MadhavJivrajani added the kind/failing-test Categorizes issue or PR as related to a consistently or frequently failing test. label Mar 23, 2022
@k8s-ci-robot k8s-ci-robot added sig/testing Categorizes an issue or PR as relevant to SIG Testing. needs-triage Indicates an issue or PR lacks a `triage/foo` label and requires one. labels Mar 23, 2022
@MadhavJivrajani
Copy link
Contributor Author

/priority critical-urgent
/cc @dims @aojea

@k8s-ci-robot k8s-ci-robot added the priority/critical-urgent Highest priority. Must be actively worked on as someone's top priority right now. label Mar 23, 2022
@nikhita
Copy link
Member

nikhita commented Mar 23, 2022

https://tip.golang.org/doc/go1.18#sha1

The failures for https://testgrid.k8s.io/sig-release-master-blocking#integration-master look like they are related to this.

Example below:

x509: cannot verify signature: insecure algorithm SHA1-RSA (temporarily override with GODEBUG=x509sha1=1)

@MadhavJivrajani
Copy link
Contributor Author

/assign

@aojea
Copy link
Member

aojea commented Mar 23, 2022

So, presubmits jobs didn't catch these things?

@MadhavJivrajani
Copy link
Contributor Author

A temporary fix, quick fix would be setting the env variable as suggested:

GODEBUG=x509sha1=1

Continuing to look
/sig auth
(for visibility)

@k8s-ci-robot k8s-ci-robot added the sig/auth Categorizes an issue or PR as relevant to SIG Auth. label Mar 23, 2022
@MadhavJivrajani
Copy link
Contributor Author

So, presubmits jobs didn't catch these things?

yeah, I'm wondering this too

@aojea
Copy link
Member

aojea commented Mar 23, 2022

it seems golang has to do a minor release golang/go#41682 (comment), they are being too strict and sha1 in signatures seems to be allowed

https://go-review.googlesource.com/c/go/+/394294/3/src/crypto/x509/x509.go

@aojea
Copy link
Member

aojea commented Mar 23, 2022

/cc @liggitt

@dims
Copy link
Member

dims commented Mar 23, 2022

presubmits were using image based on golang 1.17, so we hit it AFTER the 1.18 in k/k merged and then the master image was updated from 1.17 to 1.18

@MadhavJivrajani
Copy link
Contributor Author

MadhavJivrajani commented Mar 23, 2022

The CI failures should now be fixed (temporarily) on account of: #108901
Thanks Dims!

Not closing this out as we still need to fix things (regenerate hard-coded certs) in order to be fully back in business.

@MadhavJivrajani
Copy link
Contributor Author

/remove-priority critical-urgent
/priority important-soon

@k8s-ci-robot k8s-ci-robot added priority/important-soon Must be staffed and worked on either currently, or very soon, ideally in time for the next release. and removed priority/critical-urgent Highest priority. Must be actively worked on as someone's top priority right now. labels Mar 23, 2022
@liggitt
Copy link
Member

liggitt commented Mar 23, 2022

we still need to fix things (regenerate hard-coded certs) in order to be fully back in business

Actually, I think the CSR failures are a go bug we need to wait for go1.18.1 for

@liggitt liggitt added this to the v1.24 milestone Mar 23, 2022
@liggitt liggitt added the kind/bug Categorizes issue or PR as related to a bug. label Mar 23, 2022
@dims
Copy link
Member

dims commented Mar 25, 2022

it looks like all the integration test failures are for CSR objects, which will be resolved in go1.18.1

marking this as a blocker for 1.24

@liggitt do we have commitment from the golang team to ship go1.18.1 with the fix we need in time for 1.24? (what are our chances?)

@liggitt
Copy link
Member

liggitt commented Mar 25, 2022

I don't know, but given it is a recovery release fixing a regression, I would expect it sooner than the normal ~month cadence

@dims
Copy link
Member

dims commented Mar 25, 2022

Thanks @liggitt ! Looks like the backport issue is here: golang/go#51852

@enj enj added this to Needs Triage in SIG Auth Old Mar 29, 2022
@liggitt liggitt changed the title go1.18: [Tracker] Switch to Go 1.18 causes integration tests to break (fixed in go1.18.1) go1.18: [Tracker] go1.18 breaks CSR validation (fix pending in go1.18.1) Mar 31, 2022
@dims
Copy link
Member

dims commented Apr 4, 2022

@MadhavJivrajani do you wanna open a CL in golang repo? golang/go#51852 (comment)

@liggitt
Copy link
Member

liggitt commented Apr 4, 2022

don't open a new CL, the one against master is under review and will be picked once ready

@dims
Copy link
Member

dims commented Apr 4, 2022

@liggitt thanks. the linked comment caused me to wonder!

@dims
Copy link
Member

dims commented Apr 4, 2022

So for folks following along:

sounds right @liggitt ?

@ritazh ritazh moved this from Needs Triage to Pending other SIGs in SIG Auth Old Apr 4, 2022
@liggitt
Copy link
Member

liggitt commented Apr 4, 2022

golang master CL merged, pick open to release-1.18 https://go-review.googlesource.com/c/go/+/398074

@dims
Copy link
Member

dims commented Apr 4, 2022

for this one ... i want to be proven wrong :) (i said, it may not go into 1.18.1 on record!)

@liggitt
Copy link
Member

liggitt commented Apr 5, 2022

https://go-review.googlesource.com/c/go/+/398074 merged to go 1.18 branch, appears it will be in go1.18.1

@dims
Copy link
Member

dims commented Apr 5, 2022

/meow
/woof

@k8s-ci-robot
Copy link
Contributor

@dims: dog image

In response to this:

/meow
/woof

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@k8s-ci-robot
Copy link
Contributor

@dims: cat image

In response to this:

/meow
/woof

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@MadhavJivrajani
Copy link
Contributor Author

@pacoxu
Copy link
Member

pacoxu commented Apr 13, 2022

@pacoxu
Copy link
Member

pacoxu commented Apr 13, 2022

kubernetes/release#2499 will update the dependency

@dims
Copy link
Member

dims commented Apr 14, 2022

fixed k/k last remaining problem with 1.18.1 in #109312

/close

@k8s-ci-robot
Copy link
Contributor

@dims: Closing this issue.

In response to this:

fixed k/k last remaining problem with 1.18.1 in #109312

/close

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/bug Categorizes issue or PR as related to a bug. kind/failing-test Categorizes issue or PR as related to a consistently or frequently failing test. priority/important-soon Must be staffed and worked on either currently, or very soon, ideally in time for the next release. release-blocker sig/auth Categorizes an issue or PR as relevant to SIG Auth. sig/testing Categorizes an issue or PR as relevant to SIG Testing. triage/accepted Indicates an issue or PR is ready to be actively worked on.
Projects
Archived in project
SIG Auth Old
Closed / Done
Development

No branches or pull requests

8 participants