Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Prefer runtime options for PluginInfo request #11442

Merged
merged 1 commit into from
Feb 27, 2025

Conversation

jfernandez
Copy link
Contributor

Previously, PluginInfo was called with task options as the primary value, resulting in opts.BinaryName being omitted. Consequently, the containerd-shim-runc-v2 fell back to the system's runc binary in the PATH rather than the explicitly specified one. This change inverts the option fallback by preferring runtime options over task options, ensuring the correct binary is used for the PluginInfo request.

At Netflix, we maintain runc in both /usr/bin (which lacks support for user namespaces) and at a custom path. This issue surfaced when enabling user namespaces and encountering the error:

Error: failed to create containerd task: failed to validate OCI runtime
       features: idmap mounts not supported: missing `mountExtensions.idmap`
       entry in the `features` command

Although the features command for runc at our custom path confirmed that mountExtensions.idmap was enabled, the issue arose because opts.BinaryName was blank in the shim code (see:
https://github.com/containerd/containerd/blob/main/cmd/containerd-shim-runc-v2/manager/manager_linux.go#L345), triggering a fallback to the default runc binary at /usr/bin.

Closes: #11169

Previously, PluginInfo was called with task options as the primary
value, resulting in opts.BinaryName being omitted. Consequently, the
containerd-shim-runc-v2 fell back to the system's runc binary in the
PATH rather than the explicitly specified one. This change inverts the
option fallback by preferring runtime options over task options,
ensuring the correct binary is used for the PluginInfo request.

Closes: containerd#11169

Signed-off-by: Jose Fernandez <[email protected]>
Reviewed-by: Erikson Tung <[email protected]>
@k8s-ci-robot
Copy link

Hi @jfernandez. Thanks for your PR.

I'm waiting for a containerd member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@djdongjin
Copy link
Member

/ok-to-test

@djdongjin
Copy link
Member

/retest

Copy link
Member

@AkihiroSuda AkihiroSuda left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks

@AkihiroSuda AkihiroSuda added the cherry-pick/2.0.x Change to be cherry picked to release/2.0 branch label Feb 27, 2025
@AkihiroSuda
Copy link
Member

Would it be possible to have an integration test?

Copy link
Member

@djdongjin djdongjin left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@jfernandez
Copy link
Contributor Author

Would it be possible to have an integration test?

Could you give me a code hint about where you'd drop the integration test for this? Or should I create a new file?

@jfernandez
Copy link
Contributor Author

@AkihiroSuda, I attempted to write an integration test, but I'm facing a challenge. To verify the behavior, I need to set up the following in the test:

  1. Remove runc from the PATH.
  2. Place runc at a custom path.
  3. Call TaskManager.Create in the integration test.
  4. Verify that there isn't an error indicating that the shim could not find the runc binary.

I'm not entirely sure how to accomplish steps 1 and 2. If you have any suggestions for a simpler way to test this, please let me know. Otherwise, I would prefer to proceed with the PR as is, and then circle back to add better test coverage to this part of the codebase.

Copy link
Member

@AkihiroSuda AkihiroSuda left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Let's merge this for now

@AkihiroSuda AkihiroSuda added this pull request to the merge queue Feb 27, 2025
Merged via the queue into containerd:main with commit 2f9d22c Feb 27, 2025
58 checks passed
@AkihiroSuda
Copy link
Member

/cherry-pick release/2.0

@k8s-infra-cherrypick-robot

@AkihiroSuda: new pull request created: #11446

In response to this:

/cherry-pick release/2.0

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/runtime Runtime cherry-picked/2.0.x PR commits are cherry picked into the release/2.0 branch ok-to-test size/XS
Projects
Archived in project
Development

Successfully merging this pull request may close these issues.

runtime options seem to be ignored (again) with v2.0.1
6 participants