-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update runc to v1.1.7 #15375
Update runc to v1.1.7 #15375
Conversation
Awesome - fingers crossed that this now works after the gce CSI update :-) |
Unfortunately, it looks like it's still failing... |
/test pull-kops-e2e-k8s-gce-ci |
/test pull-kops-e2e-k8s-gce-ci |
2 similar comments
/test pull-kops-e2e-k8s-gce-ci |
/test pull-kops-e2e-k8s-gce-ci |
Most likely related to opencontainers/runc#3849. |
@anthonyhaussman ^^^ |
/hold |
FWIW, I've been considering what to do in KIND, and it seems we have some other unrelated problems, but only 1.24+ will get the k8s patch so runc 1.1.6+ currently will break anyone on cgroups v1 and <1.23, seems like this should be held for a bit? 1.1.5 had the CVE fixes. Unless I'm mis-reading https://kops.sigs.k8s.io/welcome/releases/
(I'm actually just interested in how kOps will handle this, as some degree of precedent for other projects with the same problem) |
@BenTheElder kOps doesn't have strict control on the patch versions that operators use. We may have to start set the For sure we will have to hold back containerd + runc for older K8s versions, as you suggested. Regarding the mention that CVEs were fixed in v1.1.5, that's true for now. There will be other CVEs, so holding back is not ideal. We were hesitant of switching the default base image to Ubuntu 22.04 with |
/test all |
/test pull-kops-e2e-cni-cilium-etcd |
/test pull-kops-e2e-cni-amazonvpc |
/retest |
/cc @justinsb |
/hold cancel |
/retest |
Thanks @hakman ... I might have a go at rewriting the /approve |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: justinsb The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/retest |
FTR: kind is disabling the misc controller on cgroups v1. Seeing as it's unlikely to be used by anything in Kubernetes and wasn't supported by runc on v1 until now anyhow. xref kubernetes-sigs/kind#3223 That pretty neatly avoids all of the issues. Though for KIND that's a bit messy to accomplish. |
Update runc to v1.1.7
No description provided.