[WIP] Fixed youki molecule test#13102
[WIP] Fixed youki molecule test#13102tico88612 wants to merge 3 commits intokubernetes-sigs:masterfrom
Conversation
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: tico88612 The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
Only molecule /label ci-short |
071f59e to
9e7ed30
Compare
The youki molecule test fails because youki's libseccomp binding treats duplicate seccomp rules as fatal (EEXIST), unlike crun/runc which silently ignore them. CRI-O's default seccomp profile contains duplicate rules for the socket syscall (AF_NETLINK), triggering this failure. Work around this by setting seccomp profile_type to Unconfined (1) in the shared sandbox.json.j2 template when youki_enabled is true, so CRI-O skips applying its default seccomp profile for youki test runs. Signed-off-by: ChengHao Yang <17496418+tico88612@users.noreply.github.com>
Signed-off-by: ChengHao Yang <17496418+tico88612@users.noreply.github.com>
9e7ed30 to
91c9b58
Compare
|
/remove-label ci-short |
|
/retest |
|
/cc @VannTen |
|
Can we fill an issue on CRI-O side and reference it ? This looks like something which would also cause problem in real clusters. |
|
I'm not sure if this is a youki or a CRI-O issue, so I'll check with youki first. |
|
PR needs rebase. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
What type of PR is this?
/kind failing-test
What this PR does / why we need it:
The youki molecule test fails because youki's libseccomp binding treats
duplicate seccomp rules as fatal (EEXIST), unlike crun/runc which
silently ignore them. CRI-O's default seccomp profile contains duplicate
rules for the socket syscall (AF_NETLINK), triggering this failure.
Work around this by setting seccomp profile_type to Unconfined (1) in
the shared sandbox.json.j2 template when youki_enabled is true, so
CRI-O skips applying its default seccomp profile for youki test runs.
Special notes for your reviewer:
#13076 failing at youki molecule, I'm not sure which layer is causing the issue yet; I don't see any obvious commits in CRI-O.
Does this PR introduce a user-facing change?: