[release/1.7] Handle teardown failure to avoid blocking cleanup#10770
[release/1.7] Handle teardown failure to avoid blocking cleanup#10770matteopulcini6 wants to merge 1 commit intocontainerd:release/1.7from
Conversation
|
Hi @matteopulcini6. Thanks for your PR. I'm waiting for a containerd member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
7e5a8b8 to
50dc942
Compare
mikebrow
left a comment
There was a problem hiding this comment.
looking good need to also put this new block down on line 451 in the user ns networking block
|
/ok-to-test |
|
/retest |
|
failures are not related to PR.. looks like the container registry is blocking.. will try again later. |
Sample flowpod-config.json:, per crictl docs Current behaviour from running sandbox pod - receive CNI plugin error, but pod still comes up: Changes madeCurrent code (release 1.7): containerd/pkg/cri/server/sandbox_run.go Lines 323 to 326 in 45967a7 containerd/pkg/cri/server/sandbox_run.go Lines 444 to 447 in 45967a7 Changes were added to the above This makes it so that a pod cannot be started if no CNI plugins are initialized: |
fuweid
left a comment
There was a problem hiding this comment.
would you please squash the commits? Thanks
d277591 to
9fe6976
Compare
|
@fuweid commits are squashed |
|
This had the 1.7 cherry pick label, is this change already in main? |
dmcgowan
left a comment
There was a problem hiding this comment.
This will deviate from main, a change needs to get merged there first
Nod.. main first.. overlooked release in my review when I tagged it cherry pick. |
|
@matteopulcini6 pls do a commit --amend and remove the extra commit header signatures and only need one 69 char description line for it .. Cheers to |
Signed-off-by: Matteo Pulcini <Matteo.Pulcini@ibm.com>
9fe6976 to
59d7eed
Compare
|
/retest |
It looks like the scenario for this is where the CNI was never setup in the first place however RunPodSandbox was still called. I am guessing this is coming from using crictl runp directly? @mikebrow @aojea this might be different? |
Follow up to #10744 (comment)
MIke:
The scenario here is CNI is not configured / installed .. there are no plugins.. cni setup fails.. returns error and CNIResult is nil... While processing the defer chain to clean up the partially created pod.. cni tear down will also fail because.. Subsequently netns is not destroyed and then because netns is not destroyed the pod is created in the not cleaned up state. The user must manually attempt stop at this point. In the case where cni is not configured, we should not require it to be configured to clean up.