-
Notifications
You must be signed in to change notification settings - Fork 3.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[release/1.7] Handle teardown failure to avoid blocking cleanup #10770
base: release/1.7
Are you sure you want to change the base?
[release/1.7] Handle teardown failure to avoid blocking cleanup #10770
Conversation
Hi @matteopulcini6. Thanks for your PR. I'm waiting for a containerd member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
7e5a8b8
to
50dc942
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
looking good need to also put this new block down on line 451 in the user ns networking block
/ok-to-test |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM on green
/retest |
failures are not related to PR.. looks like the container registry is blocking.. will try again later. |
Sample flowpod-config.json:, per crictl docs
Current behaviour from running sandbox pod - receive CNI plugin error, but pod still comes up:
Changes madeCurrent code (release 1.7): containerd/pkg/cri/server/sandbox_run.go Lines 323 to 326 in 45967a7
containerd/pkg/cri/server/sandbox_run.go Lines 444 to 447 in 45967a7
Changes were added to the above
This makes it so that a pod cannot be started if no CNI plugins are initialized:
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
would you please squash the commits? Thanks
d277591
to
9fe6976
Compare
@fuweid commits are squashed |
This had the 1.7 cherry pick label, is this change already in main? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This will deviate from main, a change needs to get merged there first
Nod.. main first.. overlooked release in my review when I tagged it cherry pick. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM with the commit header cleanup
@matteopulcini6 pls do a commit --amend and remove the extra commit header signatures and only need one 69 char description line for it .. Cheers
to
|
Signed-off-by: Matteo Pulcini <[email protected]>
9fe6976
to
59d7eed
Compare
/retest |
Follow up to #10744 (comment)
MIke:
The scenario here is CNI is not configured / installed .. there are no plugins.. cni setup fails.. returns error and CNIResult is nil... While processing the defer chain to clean up the partially created pod.. cni tear down will also fail because.. Subsequently netns is not destroyed and then because netns is not destroyed the pod is created in the not cleaned up state. The user must manually attempt stop at this point. In the case where cni is not configured, we should not require it to be configured to clean up.