mirror of
https://github.com/kata-containers/kata-containers.git
synced 2026-05-17 04:52:23 +00:00
tests: Use podsandbox sandboxer for the runc sanity check
The check_daemon_setup function verifies that containerd + runc are functional before the real kata tests run. Using the shim sandboxer for this runc check hits a known containerd bug where the OCI spec is not populated before NewBundle is called, so config.json is never written and containerd-shim-runc-v2 fails at startup. See containerd/containerd#11640 The sandboxer choice is irrelevant for this sanity check, so use podsandbox which works correctly with runc. Signed-off-by: Fabiano Fidêncio <ffidencio@nvidia.com> Signed-off-by: Alex Lyn <alex.lyn@antgroup.com>
This commit is contained in:
@@ -170,6 +170,13 @@ function err_report() {
|
||||
|
||||
function check_daemon_setup() {
|
||||
info "containerd(cri): Check daemon works with runc"
|
||||
# Use podsandbox for the runc sanity check: the shim sandboxer has a known
|
||||
# containerd-side bug where the OCI spec is not populated before NewBundle is
|
||||
# called, so config.json is never written and containerd-shim-runc-v2 fails.
|
||||
# See https://github.com/containerd/containerd/issues/11640
|
||||
# This check only verifies that containerd + runc are functional before the
|
||||
# real kata tests run, so the sandboxer choice doesn't matter here.
|
||||
local SANDBOXER="podsandbox"
|
||||
create_containerd_config "runc"
|
||||
|
||||
# containerd cri-integration will modify the passed in config file. Let's
|
||||
|
||||
Reference in New Issue
Block a user