-
Notifications
You must be signed in to change notification settings - Fork 15
Conversation
kubernetes qa-passed 👍 |
Ah - I see it's for |
dd9d412
to
fa1a9f6
Compare
kubernetes qa-failed 👎 |
@jodh-intel I have added additional description in the commit message, however I am seeing the unit tests for proxy failing. Not able to reproduce locally though. |
This is to pull in changes related to --no-new-privileges flag and Linux capabilities. Virtcontainers shortlog: fb1eecd mount: Fix unmount of dangling bind-mounts d7462c7 pkg/oci: Clarify resource calculation comment 027aab8 qemu: adjust QMP naming to avoid non-unique truncation 0c4064e capabilities: Pass capabilities to hyperstart. e20ba9d oci: Add support for capabilities 6776dd9 shim: Correct kata debug flag b307c08 qemu: refactor/simplify addDevice function 747d364 vhost-user: rewrite to use interfaces/embedded types cc67fb0 vhost-user: enabling for vhost-user network devices f5587cf device: make a more generic function for hypervisor args d6f0600 gitignore: Add new shim binary to gitignore list bf8359f gitignore: Add new shim binary to gitignore list c30fd9a ci: Install missing dep tool d1bb792 kata_agent: Signal the kata shim 08c96c2 shim: Generalize stopShim 3e86f7b vendor: Force kata containers agent vendoring 34952bb shim: Factorize the shim config structure between kata and CC a7e244a shim: Factorize shim execution code eb8befb shim: Add a Kata shim mock implementation 6da9685 shim: Add a Kata Containers shim type 18f46de kata_shim: Initial implementation 60a446a container: Generate process token when not set 4c2c9a4 mounts: Fix bug while checking if /dev was bind-mounted 67fcb6d pkg/oci: honour CPU period and quota 1a3de59 agent: Add kata exec, stopContainer and killContainer 4f92997 annotations: Update tests to use package prefix b3da3de mount: Fix tests for bindMountContainerRootfs function aa75a0e kata_agent: Implement vmURL and setProxyURL 53f093d kata_agent: Initial VSOCK support bc302d2 kata_agent: Implement the validate function cb7fac2 kata_agent: Rename shared dir paths 0b95eda kata_agent: Create and start container implementations c4a4be4 mount: Gather the entire bind mount API be96f34 vendor: Update for Kata Containers c0692ca annotations: Move OCI annotations to the annotation package 1a638c0 ci: Handle complex revendoring cases fe726af kata_agent: Implement pod start and stop ops 3d1afe4 kata_agent: Initialize gRPC client f6948d8 agent: Add new agent type for Kata Containers 7d35db6 kata_agent: Add Kata agent configuration b2fe3df hyperstart: Rename to hyperstart_agent f86cd11 kata_agent: Initial implementation 414e156 qemu: improve kernel boot time bdde7bb pod: Add important comment for Cmd type a217958 oci: Pass the NoNewPrivileges flag to the agent. f683602 oci: Add support for NoNewPrivileges in oci spec ddd89b7 cheanup: Remove vendored "golang.org/x/crypto" package. fd6e357 cleanup: Remove sshd agent b7c19b8 cni: update function names for consistency 847eaaa network: scan network one less time dc4836a network: unique ID is not unique 8449f56 network: refactoring and cleanup of CNI path d6f9690 vendor: Revendor govmm for VSOCK support Fixes clearcontainers#195 Signed-off-by: Archana Shinde <archana.m.shinde@intel.com>
fa1a9f6
to
f768e56
Compare
kubernetes qa-failed 👎 |
@chavafg any idea why k8s failed? |
@jcvenegas @amshinde, The kubernetes pods cannot be created successfully. Hanged processes:
From
|
@chavafg Looks like the process within the container failed to start, likely caused by failure of newcontainer command. Do you see any errors from the agent of type "ERROR received from VM agent" ? |
@amshinde containers/virtcontainers#581 should be merged first, and then you have to include it together with #208 in this PR |
... and you will need clearcontainers/agent#202 in the agent |
@devimc I dont understand why that change is required. I have added my comments in the issue. Is there something different going on with k8s? |
@amshinde take a look to the code, cc-proxy sends/writes a pointer to Process and cc-agent receives/reads a Process, and k8s sends a lot of data, probably that's the reason |
@devimc cc-proxy should marshal the pointers correctly to json, it really should not matter if proxy uses pointers/object as long as it is marshalled correctly. Please correct me if I am missing something. I suspect this may be due to data going over 4096 bytes. |
@amshinde if that is the case, then just apply clearcontainers/agent#202 and this patch, if that works in k8s then you're right and containers/virtcontainers#581 and #208 are not needed |
@chavafg Can you try the k8 tests wiith the latest agent code that has @devimc's changes: |
cc @egernst |
LGTM |
@amshinde I tested with latest agent code (which includes clearcontainers/agent#202) and I got these errors:
which I think is |
@chavafg -- just catching up on the issue. Seems that's not a new error. Does that occur on the baseline (ie, whatever is on master for proxy) right now as well? If so, I'd like to see this get merged. |
Seems like we are carrying clearcontainers/agent#182 on the latest agent, which I think should be solved first in order to be able to use it as base for a new image. |
vendor: Vendor virtcontainers
This is to pull in changes related to --no-new-privileges flag
and Linux capabilities.
Virtcontainers shortlog:
fb1eecd mount: Fix unmount of dangling bind-mounts
d7462c7 pkg/oci: Clarify resource calculation comment
027aab8 qemu: adjust QMP naming to avoid non-unique truncation
0c4064e capabilities: Pass capabilities to hyperstart.
e20ba9d oci: Add support for capabilities
6776dd9 shim: Correct kata debug flag
b307c08 qemu: refactor/simplify addDevice function
747d364 vhost-user: rewrite to use interfaces/embedded types
cc67fb0 vhost-user: enabling for vhost-user network devices
f5587cf device: make a more generic function for hypervisor args
d6f0600 gitignore: Add new shim binary to gitignore list
bf8359f gitignore: Add new shim binary to gitignore list
c30fd9a ci: Install missing dep tool
d1bb792 kata_agent: Signal the kata shim
08c96c2 shim: Generalize stopShim
3e86f7b vendor: Force kata containers agent vendoring
34952bb shim: Factorize the shim config structure between kata and CC
a7e244a shim: Factorize shim execution code
eb8befb shim: Add a Kata shim mock implementation
6da9685 shim: Add a Kata Containers shim type
18f46de kata_shim: Initial implementation
60a446a container: Generate process token when not set
4c2c9a4 mounts: Fix bug while checking if /dev was bind-mounted
67fcb6d pkg/oci: honour CPU period and quota
1a3de59 agent: Add kata exec, stopContainer and killContainer
4f92997 annotations: Update tests to use package prefix
b3da3de mount: Fix tests for bindMountContainerRootfs function
aa75a0e kata_agent: Implement vmURL and setProxyURL
53f093d kata_agent: Initial VSOCK support
bc302d2 kata_agent: Implement the validate function
cb7fac2 kata_agent: Rename shared dir paths
0b95eda kata_agent: Create and start container implementations
c4a4be4 mount: Gather the entire bind mount API
be96f34 vendor: Update for Kata Containers
c0692ca annotations: Move OCI annotations to the annotation package
1a638c0 ci: Handle complex revendoring cases
fe726af kata_agent: Implement pod start and stop ops
3d1afe4 kata_agent: Initialize gRPC client
f6948d8 agent: Add new agent type for Kata Containers
7d35db6 kata_agent: Add Kata agent configuration
b2fe3df hyperstart: Rename to hyperstart_agent
f86cd11 kata_agent: Initial implementation
414e156 qemu: improve kernel boot time
bdde7bb pod: Add important comment for Cmd type
a217958 oci: Pass the NoNewPrivileges flag to the agent.
f683602 oci: Add support for NoNewPrivileges in oci spec
ddd89b7 cheanup: Remove vendored "golang.org/x/crypto" package.
fd6e357 cleanup: Remove sshd agent
b7c19b8 cni: update function names for consistency
847eaaa network: scan network one less time
dc4836a network: unique ID is not unique
8449f56 network: refactoring and cleanup of CNI path
d6f9690 vendor: Revendor govmm for VSOCK support
Fixes #195
Signed-off-by: Archana Shinde archana.m.shinde@intel.com