Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Error running v0.10 under WASL (Ubuntu on Win10) #4339

Closed
coverband opened this issue Apr 11, 2018 · 8 comments
Closed

Error running v0.10 under WASL (Ubuntu on Win10) #4339

coverband opened this issue Apr 11, 2018 · 8 comments

Comments

@coverband
Copy link

Environment:

  • Vault Version:
    0.10
  • Operating System/Architecture:
    Ubuntu 16.04 LTS (running in WASL)

Vault Config File:
n/a

Startup Log Output:

runtime: epollwait on fd 4 failed with 38
fatal error: runtime: netpoll failed

runtime stack:
runtime.throw(0x22ced55, 0x17)
        /goroot/src/runtime/panic.go:616 +0x81
runtime.netpoll(0xca8e323d00, 0xc400000000)
        /goroot/src/runtime/netpoll_epoll.go:75 +0x216
runtime.sysmon()
        /goroot/src/runtime/proc.go:4265 +0x424
runtime.mstart1(0x0)
        /goroot/src/runtime/proc.go:1227 +0xe7
runtime.mstart()
        /goroot/src/runtime/proc.go:1193 +0x76

goroutine 1 [runnable, locked to thread]:
github.com/hashicorp/vault/vendor/github.com/denisenkom/go-mssqldb.init()
        /gopath/src/github.com/hashicorp/vault/vendor/github.com/denisenkom/go-mssqldb/cp949.go:17310 +0x29f

goroutine 5 [syscall]:
os/signal.signal_recv(0x0)
        /goroot/src/runtime/sigqueue.go:139 +0xa6
os/signal.loop()
        /goroot/src/os/signal/signal_unix.go:22 +0x22
created by os/signal.init.0
        /goroot/src/os/signal/signal_unix.go:28 +0x41

Expected Behavior:
Usual vault behavior as was observed with 0.9.5

Actual Behavior:
vault fails to initiate and shows fatal error

Steps to Reproduce:
run vault binary

Important Factoids:
An attempt was made to replace a working copy of vault 0.9.5 with the updated version.

References:
n/a

@jefferai
Copy link
Member

Cannot reproduce:

jeff@Kraken:~$ file vault
vault: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, not stripped
jeff@Kraken:~$ ./vault version
Vault v0.10.0 ('5dd7f25f5c4b541f2da62d70075b6f82771a650d')
jeff@Kraken:~$ ./vault server -dev
==> Vault server configuration:

             Api Address: http://127.0.0.1:8200
                     Cgo: disabled
         Cluster Address: https://127.0.0.1:8201
              Listener 1: tcp (addr: "127.0.0.1:8200", cluster address: "127.0.0.1:8201", tls: "disabled")
               Log Level: info
                   Mlock: supported: true, enabled: false
                 Storage: inmem
                 Version: Vault v0.10.0
             Version Sha: 5dd7f25f5c4b541f2da62d70075b6f82771a650d

WARNING! dev mode is enabled! In this mode, Vault runs entirely in-memory
and starts unsealed with a single unseal key. The root token is already
authenticated to the CLI, so you can immediately begin using Vault.

You may need to set the following environment variable:

    $ export VAULT_ADDR='http://127.0.0.1:8200'

The unseal key and root token are displayed below in case you want to
seal/unseal the Vault or re-authenticate.

Unseal Key: hqtwvBbdRPG96BpBLOphGZXoIwBT0BovjKaePtk+xaE=
Root Token: 407b05f3-8c9a-bb6e-3bc0-af2a9dfbaf63

Development mode should NOT be used in production installations!

==> Vault server started! Log data will stream in below:

2018-04-12T10:06:58.890-0400 [INFO ] core: security barrier not initialized
2018-04-12T10:06:58.890-0400 [INFO ] core: security barrier initialized: shares=1 threshold=1
2018-04-12T10:06:58.890-0400 [INFO ] core: post-unseal setup starting
2018-04-12T10:06:58.898-0400 [INFO ] core: loaded wrapping token key
2018-04-12T10:06:58.898-0400 [INFO ] core: successfully setup plugin catalog: plugin-directory=
2018-04-12T10:06:58.899-0400 [INFO ] core: successfully mounted backend: type=kv path=secret/
2018-04-12T10:06:58.899-0400 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/
2018-04-12T10:06:58.899-0400 [INFO ] core: successfully mounted backend: type=system path=sys/
2018-04-12T10:06:58.899-0400 [INFO ] core: successfully mounted backend: type=identity path=identity/
2018-04-12T10:06:58.900-0400 [INFO ] core: restoring leases
2018-04-12T10:06:58.901-0400 [INFO ] rollback: starting rollback manager
2018-04-12T10:06:58.901-0400 [INFO ] identity: entities restored
2018-04-12T10:06:58.901-0400 [INFO ] identity: groups restored
2018-04-12T10:06:58.901-0400 [INFO ] core: post-unseal setup complete
2018-04-12T10:06:58.901-0400 [INFO ] core: root token generated
2018-04-12T10:06:58.901-0400 [INFO ] core: pre-seal teardown starting
2018-04-12T10:06:58.901-0400 [INFO ] core: cluster listeners not running
2018-04-12T10:06:58.901-0400 [INFO ] expiration: lease restore complete
2018-04-12T10:06:58.911-0400 [INFO ] rollback: stopping rollback manager
2018-04-12T10:06:58.911-0400 [INFO ] core: pre-seal teardown complete
2018-04-12T10:06:58.911-0400 [INFO ] core: vault is unsealed
2018-04-12T10:06:58.911-0400 [INFO ] core: post-unseal setup starting
2018-04-12T10:06:58.911-0400 [INFO ] core: loaded wrapping token key
2018-04-12T10:06:58.911-0400 [INFO ] core: successfully setup plugin catalog: plugin-directory=
2018-04-12T10:06:58.911-0400 [INFO ] core: successfully mounted backend: type=kv path=secret/
2018-04-12T10:06:58.911-0400 [INFO ] core: successfully mounted backend: type=system path=sys/
2018-04-12T10:06:58.911-0400 [INFO ] core: successfully mounted backend: type=identity path=identity/
2018-04-12T10:06:58.911-0400 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/
2018-04-12T10:06:58.912-0400 [INFO ] core: restoring leases
2018-04-12T10:06:58.912-0400 [INFO ] rollback: starting rollback manager
2018-04-12T10:06:58.912-0400 [INFO ] identity: entities restored
2018-04-12T10:06:58.912-0400 [INFO ] identity: groups restored
2018-04-12T10:06:58.912-0400 [INFO ] core: post-unseal setup complete
2018-04-12T10:06:58.912-0400 [INFO ] expiration: lease restore complete
2018-04-12T10:06:58.915-0400 [INFO ] core: mount tuning of options: path=secret/ options=map[version:2]
2018-04-12T10:06:58.916-0400 [INFO ] secrets.kv.kv_aaa67d0e: collecting keys to upgrade
2018-04-12T10:06:58.916-0400 [INFO ] secrets.kv.kv_aaa67d0e: done collecting keys: num_keys=1
2018-04-12T10:06:58.916-0400 [INFO ] secrets.kv.kv_aaa67d0e: upgrading keys finished

@coverband
Copy link
Author

I'm still having the same issue, after removing/reinstalling/etc. Any suggestions? Note that the "no repro" did not mention installing over prior vault instance.

@jefferai
Copy link
Member

I don't know how to reproduce so I can't really know what the problem might be. If you can come up with a repeatable repro case I can dig in.

@jjuel
Copy link

jjuel commented Apr 27, 2018

It happens every time on my machine as well under the WSL. Although when I do it I am behind a proxy. Not sure if there is a setting for vault with a proxy or not. So I guess not sure if this is a proxy issue or if it is a WSL issue.

@conanbee
Copy link

conanbee commented May 4, 2018

i have the same issue also. It happens on my WSL even only running vault binary.

[16:59:08][root@GH-9NCJ4H2:/tmp]# vault
runtime: epollwait on fd 4 failed with 38
fatal error: runtime: netpoll failed

runtime stack:
runtime.throw(0x22d8ff6, 0x17)
/goroot/src/runtime/panic.go:616 +0x81
runtime.netpoll(0x2386cf022f600, 0xc400000000)
/goroot/src/runtime/netpoll_epoll.go:75 +0x216
runtime.sysmon()
/goroot/src/runtime/proc.go:4265 +0x424
runtime.mstart1(0x0)
/goroot/src/runtime/proc.go:1227 +0xe7
runtime.mstart()
/goroot/src/runtime/proc.go:1193 +0x76

goroutine 1 [syscall, locked to thread]:
regexp.makeOnePass(0xc420273830, 0xc420273830)
/goroot/src/regexp/onepass.go:309 +0x233
regexp.compileOnePass(0xc4202737d0, 0xc4202737d0)
/goroot/src/regexp/onepass.go:502 +0x1b3
regexp.compile(0x23782b7, 0x434, 0xd4, 0x10, 0x1f2d160, 0xc42022de58)
/goroot/src/regexp/regexp.go:186 +0xed
regexp.Compile(0x23782b7, 0x434, 0x1d25440, 0x358b801, 0xc4201e3020)
/goroot/src/regexp/regexp.go:133 +0x41
regexp.MustCompile(0x23782b7, 0x434, 0x5)
/goroot/src/regexp/regexp.go:238 +0x4d

goroutine 5 [syscall]:
os/signal.signal_recv(0x0)
/goroot/src/runtime/sigqueue.go:139 +0xa6
os/signal.loop()
/goroot/src/os/signal/signal_unix.go:22 +0x22
created by os/signal.init.0
/goroot/src/os/signal/signal_unix.go:28 +0x41

@coverband
Copy link
Author

@conanbee Did you have a previously working version (like me), or did it fail when attempting to use it the very first time?

@coverband
Copy link
Author

As of Windows Version 10.0.16299.371 this is now working for me. I haven't changed anything except for upgrading Win10 to 1709. Although I regularly run sudo apt-get upgrade, I think it was fixed on the Windows side.

@jefferai
Copy link
Member

jefferai commented Jun 7, 2018

Glad it's fixed! I think I was on 1709 before which might be why I didn't see it.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants