Compare commits

...

3 Commits

Author SHA1 Message Date
Manuel Huber
1b04a936d3 tests: Align CDH mount options
Test to see if there is improvements in integrity errors.

Signed-off-by: Manuel Huber <manuelh@nvidia.com>
2026-04-08 10:45:47 -07:00
Manuel Huber
ff6088050e tests: Remove lazy_journal_init for CDH mount
Remove lazy_journal_init for the CDH secure_mount option.
Re-enable concurrent image-layer pulls for the NIM test.

Signed-off-by: Manuel Huber <manuelh@nvidia.com>
2026-04-07 16:06:47 -07:00
Manuel Huber
eee6049ee9 tests: Use multiple CPUs for image layer storage
Use multiple CPUs for the image layer storage test. The purpose is to
ensure guest-pull using the container image layer storage functionality
with integrity-protected encryption works (writes to
/dev/trusted_store will be multi-threaded).

Signed-off-by: Manuel Huber <manuelh@nvidia.com>
2026-04-07 10:26:45 -07:00
3 changed files with 4 additions and 4 deletions

View File

@@ -2322,7 +2322,7 @@ async fn cdh_handler_trusted_storage(oci: &mut Spec) -> Result<()> {
&dev_major_minor,
"luks2",
KATA_IMAGE_WORK_DIR,
"-E lazy_journal_init",
"-O ^has_journal -m 0 -i 163840 -I 128",
)
.await?;
break;

View File

@@ -86,8 +86,6 @@ setup_langchain_flow() {
# generated policy.rego to it and set it as the cc_init_data annotation.
# We must overwrite the default empty file AFTER create_tmp_policy_settings_dir()
# copies it to the temp directory.
# As we use multiple vCPUs we set `max_concurrent_layer_downloads_per_image = 1`,
# see: https://github.com/kata-containers/kata-containers/issues/12721
create_nim_initdata_file() {
local output_file="$1"
local cc_kbs_address
@@ -110,7 +108,6 @@ name = "cc_kbc"
url = "${cc_kbs_address}"
[image]
max_concurrent_layer_downloads_per_image = 1
authenticated_registry_credentials_uri = "kbs:///default/credentials/nvcr"
'''
EOF

View File

@@ -28,6 +28,9 @@ spec:
command: ["/bin/sh", "-c"]
args:
- sleep 6000
resources:
limits:
cpu: "2"
volumeDevices:
- devicePath: /dev/trusted_store
name: trusted-storage