Devuan bug report logs - #687
python3-ipalib contains calls to nonexistent /bin/systemctl

version graph

Package: python3-ipalib; Maintainer for python3-ipalib is B. Stack <bgstack15@gmail.com>; Source for python3-ipalib is src:freeipa.

Reported by: Jernej Jakob <jernej.jakob@gmail.com>

Date: Thu, 7 Jul 2022 01:44:02 UTC

Severity: grave

Found in version 4.8.10-2+devuan3

Full log


🔗 View this message in rfc822 format

X-Loop: owner@bugs.devuan.org
Subject: bug#687: python3-ipalib scripts contain calls to /bin/systemctl
Reply-To: Jernej Jakob <jernej.jakob@gmail.com>, 687@bugs.devuan.org
Resent-From: Jernej Jakob <jernej.jakob@gmail.com>
Resent-To: devuan-bugs@lists.dyne.org
Resent-CC: B. Stack <bgstack15@gmail.com>
X-Loop: owner@bugs.devuan.org
Resent-Date: Thu, 07 Jul 2022 14:44:01 +0000
Resent-Message-ID: <handler.687.B687.165720502630440@bugs.devuan.org>
Resent-Sender: owner@bugs.devuan.org
X-Devuan-PR-Message: followup 687
X-Devuan-PR-Package: python3-ipalib
X-Devuan-PR-Keywords: 
References: <20220707034243.21e3d614@gentoo.home> <CABSMGamoA1DmqDmgHQiZQSTo9PW4NXMrg-vyL59SPY4JA72w5A@mail.gmail.com> <20220707034243.21e3d614@gentoo.home>
Received: via spool by 687-submit@bugs.devuan.org id=B687.165720502630440
          (code B ref 687); Thu, 07 Jul 2022 14:44:01 +0000
Received: (at 687) by bugs.devuan.org; 7 Jul 2022 14:43:46 +0000
Delivered-To: devuanbugs@dyne.org
Received: from mail.dyne.org [141.95.83.167]
	by doc.devuan.org with IMAP (fetchmail-6.4.16)
	for <debbugs@localhost> (single-drop); Thu, 07 Jul 2022 14:43:46 +0000 (UTC)
Received: from mail-ej1-f50.google.com (mail-ej1-f50.google.com [209.85.218.50])
	(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
	(No client certificate requested)
	by mail.dyne.org (Postfix) with ESMTPS id 6D23C6617E6
	for <687@bugs.devuan.org>; Thu,  7 Jul 2022 16:42:20 +0200 (CEST)
Authentication-Results: mail.dyne.org;
	dkim=pass (2048-bit key; unprotected) header.d=gmail.com header.i=@gmail.com header.b="M63PfrYG";
	dkim-atps=neutral
Received: by mail-ej1-f50.google.com with SMTP id os14so2573047ejb.4
        for <687@bugs.devuan.org>; Thu, 07 Jul 2022 07:42:20 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=date:from:to:subject:message-id:in-reply-to:references:mime-version
         :content-transfer-encoding;
        bh=IzUC8YbIfv3T1E2Zygyk/gFK8y9H/Tcf7JCJHhiPxDo=;
        b=M63PfrYGkoEXNNoIpt9ZJubKt5cMGISI7DLEsBjt0VRwAepL6DYMKyCLJiUgumy+wG
         bkNf4FCldRJxzojRcrSsKoTaEIZpWSJvwMtrvCeNv03FwR6bClw8qS8mhSNj/tfX4A7u
         cLN63cJTFT5zrodo6+Bk2LShPOaLMoSWIgGHw7MIKszlafhkbXPjB3JMOL0ulEbx4zB3
         q/FE3j3/umd/L46hhdLqJl2mWcll8tBLKiIHQI18HZCkzvUWArw6nA6O+wkhoc+Qmsyj
         +VwxpBwPKwpPsNZRyWNIg97fAuF1DY/XU23h7gkSp0CCzIbiS8UzQFl7jzm6HW5Jd5Za
         OUXQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:date:from:to:subject:message-id:in-reply-to
         :references:mime-version:content-transfer-encoding;
        bh=IzUC8YbIfv3T1E2Zygyk/gFK8y9H/Tcf7JCJHhiPxDo=;
        b=UpbgDL9JqODtIjHTJkIaKP/kp59PCc4s+d/oPOXH8k58TXPYfsJm74v5zDvR/1vm6G
         NKczCn55T5R47VCOfv96DzuqtT9Ds0dxNRFCtt8Buner//lgNt8nj+E0h1JpHqNKRuYR
         ynXYsDvqHqhYpxO6jmvwvd7u/M3X5bJg6xFNlOWbR/0II/wrVC3odcMouxFEVO54ctUK
         X/VtjDjuSLPDqmpO2eOScwH+jnVwj2oaB5IegliKUwl9R8DFBM7zsVQfOCWc1d7sB8xx
         Ee2P7cHY6lWBdzRFd/pR1GJiVTdYL/7za8V6YBv9IcIBfGPixeM0AwGqOHBm8+vxV67O
         vO2A==
X-Gm-Message-State: AJIora/ZrnPLQpRtw4qNVNn/+OjrnM5xQHjXRY5qXm3Bs8EQd6Bgo7ga
	O8B0PAx4/6d7LzNaSGEsDL+SfyuvbyM=
X-Google-Smtp-Source: AGRyM1uP+HaK5Cru9HZUbj9aqhx4xix/OsHNPksY35xd57qiZtIlXHk6ONH4DAJSjNdO5JQxiJS03g==
X-Received: by 2002:a17:907:94c5:b0:726:b8a9:f9b9 with SMTP id dn5-20020a17090794c500b00726b8a9f9b9mr45443759ejc.123.1657204939389;
        Thu, 07 Jul 2022 07:42:19 -0700 (PDT)
Received: from gentoo.home ([2a01:260:8028:10f0::62])
        by smtp.gmail.com with ESMTPSA id v19-20020a170906381300b00721d8e5bf0bsm18994392ejc.6.2022.07.07.07.42.18
        (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);
        Thu, 07 Jul 2022 07:42:19 -0700 (PDT)
Date: Thu, 7 Jul 2022 16:42:14 +0200
From: Jernej Jakob <jernej.jakob@gmail.com>
To: 687@bugs.devuan.org, B Stack <bgstack15@gmail.com>
Message-ID: <20220707164214.53de0120@gentoo.home>
In-Reply-To: <CABSMGamoA1DmqDmgHQiZQSTo9PW4NXMrg-vyL59SPY4JA72w5A@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
X-Spam-Status: No, score=-0.2 required=5.0 tests=DKIM_SIGNED,DKIM_VALID,
	DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM,RCVD_IN_DNSWL_NONE,
	RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,SPF_PASS,URIBL_BLOCKED
	autolearn=disabled version=3.4.2
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on mail.dyne.org
On Thu, 7 Jul 2022 08:28:56 -0400
B Stack <bgstack15@gmail.com> wrote:

> I maintain a package [1] in Ceres that provides a shell script that handles
> the "systemctl" calls. I use python3-ipalib on my Devuan Ceres installs
> with this dependency and it operates just fine. If you have a patch for
> switching the embedded hardcoded invocations to service/update-rc.d
> commands, I would be happy to review it!
> 
> B. Stack
> 
> [1]:
> https://pkginfo.devuan.org/cgi-bin/package-query.html?c=package&q=systemctl-service-shim=0.0.2-1

Thanks, that's great, if it can be done without patching files in the
package. But I already have systemctl-service-shim installed, it is a
dependency of python3-ipalib. But it only provides /usr/sbin/systemctl,
not /bin/systemctl, which is where python3-ipalib expects it to be.
If I create a symlink there, ipa-client-install appears to go further,
but then hangs at:

2022-07-07T14:22:15Z DEBUG Backing up '/etc/chrony/chrony.conf'
2022-07-07T14:22:15Z DEBUG Backing up system configuration file '/etc/chrony/chrony.conf'
2022-07-07T14:22:15Z DEBUG Saving Index File to '/var/lib/ipa-client/sysrestore/sysrestore.index'
2022-07-07T14:22:15Z DEBUG Writing configuration to '/etc/chrony/chrony.conf'
2022-07-07T14:22:15Z ERROR Augeas failed to configure file /etc/chrony/chrony.conf
2022-07-07T14:22:15Z DEBUG Starting external process
2022-07-07T14:22:15Z DEBUG args=['/usr/sbin/selinuxenabled']
2022-07-07T14:22:15Z DEBUG Process execution failed
2022-07-07T14:22:15Z DEBUG Starting external process
2022-07-07T14:22:15Z DEBUG args=['/bin/systemctl', 'enable', 'chrony.service']
2022-07-07T14:25:45Z DEBUG Process interrupted

The systemctl enable process was hung for 3 minutes before I
interrupted with ctrl-C.

If I run it by hand, I see this infinite loop:

~# /bin/systemctl enable chrony.service
update-rc.d chrony enable
insserv: warning: script 'cgroups' missing LSB tags
insserv: Default-Start undefined, assuming empty start runlevel(s) for script `cgroups'
insserv: Default-Stop  undefined, assuming empty stop runlevel(s) for script `cgroups'
 * rc-update: chrony already installed in runlevel `default'; skipping
update-rc.d chrony enable
insserv: warning: script 'cgroups' missing LSB tags
insserv: Default-Start undefined, assuming empty start runlevel(s) for script `cgroups'
insserv: Default-Stop  undefined, assuming empty stop runlevel(s) for script `cgroups'
 * rc-update: chrony already installed in runlevel `default'; skipping
update-rc.d chrony enable

and so on until I press ctrl-C.

So I think this is a bug in systemctl-service-shim ?

Send a report that this bug log contains spam.


Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.

Devuan Bugs Owner <owner@bugs.devuan.org>.
Last modified: Thu Dec 12 21:28:18 2024;