-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bump base image #2465
Bump base image #2465
Conversation
/assign @BenTheElder |
/hold https://prow.k8s.io/view/gs/kubernetes-jenkins/pr-logs/pull/kubernetes-sigs_kind/2465/pull-kind-conformance-parallel-1-17/1439353716925796352 I have the same problem locally
it has to be related to cross building |
I get a different failure at HEAD now:
docker 20.10.2, kernel 5.10.40 |
Also reproduces on docker desktop currently, but I'm not at the latest version. Updating. EDIT: not sure I can run docker desktop anymore at work actually ... forgot about that. |
Looks like the fix is in place ? docker/buildx#772 (comment) |
/test all |
/test all |
I think that the problem is that the krte image used in 1.17 is too old |
When pods are running at kind cluster their product_uuid and product_name is the same since the share the kernel vfs, this PR add a new mount to OCI spec to bind mount node's product_uuid and product_name into pod's containers. Signed-off-by: Quique Llorente <[email protected]>
@AkihiroSuda some of the building fails trying to use ctr , are you going to backport this in containerd? |
That commit has been already backported in v1.5.6 |
The error looks like an issue of the host Docker rather than ctr. The Docker (Moby) PR (moby/moby#42681) was already cherry-picked into to v20.10 branch (moby/moby#42836) targeting at v20.10.10, but v20.10.10 is not released yet. |
indeed, we have so many nested layers that is hard to know 😄 diff --git a/pkg/build/nodeimage/buildcontext.go b/pkg/build/nodeimage/buildcontext.go
index 5b409df0..f07ca217 100644
--- a/pkg/build/nodeimage/buildcontext.go
+++ b/pkg/build/nodeimage/buildcontext.go
@@ -360,6 +360,7 @@ func (c *buildContext) createBuildContainer() (id string, err error) {
"--entrypoint=sleep",
"--name=" + id,
"--platform=" + dockerBuildOsAndArch(c.arch),
+ "--security-opt", "seccomp=unconfined", // ignore seccomp
},
[]string{
"infinity", // sleep infinitely to keep the container around |
I think most distros has already patched it, but I expect users hitting it in kind and reporting issues, we have to add this to the release notes |
Awesome, it was that, now everything works, the job that was failing here pass now |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
/approve
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: aojea, BenTheElder The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
@aojea please bump the default node image to one built with this base image X the latest k8s patch release |
@BenTheElder, @aojea, could you please help me understand the typical procedure followed by KinD to have new node images being re-created when the base one is bumped? Can't find any info about this topic ... I see that a new kindest/node:v1.22.2 image has been published, but what about other tags also supported by KinD's current v0.11.1 release (e.g. v1.21.x, v1.20.x, etc)? Are those images created only during release cycles? Sure, I can create them myself, but I was hoping to be able to make use of KinD's official images once that this PR got merged ... Thanks. |
There's a few issues tracking this. Currently pre-built images are primarily published upon releasing the binary. |
@rodnymolina if is for testing you can use the ones I've created for testing, they are published in |
Thanks @BenTheElder and @aojea. More than testing I'm interested in having this issue fixed for the existing KinD-in-Sysbox users. As I said, I can build the images myself, but it's best for everyone to rely on the official ones. |
The new KinD k8s-1.22 nodes includes a change [1] [2] that allows us to stop using PodPresets and still support Kubevirt Live Migration. [1] kubernetes-sigs/kind#2465 [2] kubernetes-sigs/kind#2321 Signed-off-by: Or Mergi <[email protected]>
The new KinD k8s-1.22 nodes includes a change [1] [2] that allows us to stop using PodPresets and still support Kubevirt Live Migration. [1] kubernetes-sigs/kind#2465 [2] kubernetes-sigs/kind#2321 Signed-off-by: Or Mergi <[email protected]>
The new KinD k8s-1.22 nodes includes a change [1] [2] that allows us to stop using PodPresets and still support Kubevirt Live Migration. [1] kubernetes-sigs/kind#2465 [2] kubernetes-sigs/kind#2321 Signed-off-by: Or Mergi <[email protected]>
Is there any ETA for the next version of KinD which will include this? |
Probably later this week. We don't have any outstanding known regressions now, but Antonio and I have some other obligations early this week. |
That would be awesome. Thank you! |
$userns
support (alternative to #2492) #2498Fixes: #2323, #2318, #2490