-
Notifications
You must be signed in to change notification settings - Fork 849
Remove Cgroups v1 support (podman6) #6424
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: lsm5 The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
Please remind me if we included the debian test for cgroups v1 testing (because we couldn't reliably do RHEL in CI or something else). |
|
@lsm5 I'm not sure on the Debian, But it does look like you might have a real error in the Fedora-41 runc w/ overlay: |
info.go
Outdated
| info["rootless"] = unshare.IsRootless() | ||
|
|
||
| unified, err := cgroups.IsCgroup2UnifiedMode() | ||
| _, err := cgroups.IsCgroup2UnifiedMode() |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I wonder if we can just do away with this function call entirely?
That's a known flake which should be fixed in runc 1.3.2. Not sure if/when we'll see an updated runc package for that Fedora release. Until then we don't block on CI jobs failing with runc. |
|
Ephemeral COPR build failed. @containers/packit-build please check. |
2 similar comments
|
Ephemeral COPR build failed. @containers/packit-build please check. |
|
Ephemeral COPR build failed. @containers/packit-build please check. |
e9dc40c to
f9149c3
Compare
|
@lsm5 some possible compilation issues. |
|
@nalind @flouthoc if i add a single cgroupsv2 check in main(), it causes |
|
The test sets up a chrooted environment in a user namespace with ID mappings to ensure that we can use chrooted isolation in such an environment, but that set up does not include a mount at /sys/fs/cgroup, and it looks like |
@nalind ack. So, would you suggest modifying the test to include a /sys/fs/cgroup mount, or perhaps placing the v1/v2 check somewhere else instead? |
Well, I wouldn't want it to start failing in such an environment, so if the test has to be there, my preference would be to move it elsewhere. |
449ba01 to
18b459d
Compare
1c35ea0 to
7735e61
Compare
Fixes: RUN-3567 (partly) Signed-off-by: Lokesh Mandvekar <[email protected]>
What type of PR is this?
/kind cleanup
What this PR does / why we need it:
Removes Cgroups v1 support. Required as part of Podman v6
How to verify it
Try doing anything on a cgroups v1 env and ensure nothing works (I guess).
Which issue(s) this PR fixes:
None
Special notes for your reviewer:
Only merge whenever we're merging for Podman6
Does this PR introduce a user-facing change?